Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-40198 (GCVE-0-2025-40198)
Vulnerability from cvelistv5 – Published: 2025-11-12 21:56 – Updated: 2025-12-01 06:19| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Linux | Linux |
Affected:
8b67f04ab9de5d8f3a71aef72bf02c995a506db5 , < 7bf46ff83a0ef11836e38ebd72cdc5107209342d
(git)
Affected: 8b67f04ab9de5d8f3a71aef72bf02c995a506db5 , < b2bac84fde28fb6a88817b8b761abda17a1d300b (git) Affected: 8b67f04ab9de5d8f3a71aef72bf02c995a506db5 , < e651294218d2684302ee5ed95ccf381646f3e5b4 (git) Affected: 8b67f04ab9de5d8f3a71aef72bf02c995a506db5 , < 01829af7656b56d83682b3491265d583d502e502 (git) Affected: 8b67f04ab9de5d8f3a71aef72bf02c995a506db5 , < 2a0cf438320cdb783e0378570744c0ef0d83e934 (git) Affected: 8b67f04ab9de5d8f3a71aef72bf02c995a506db5 , < a6e94557cd05adc82fae0400f6e17745563e5412 (git) Affected: 8b67f04ab9de5d8f3a71aef72bf02c995a506db5 , < 8ecb790ea8c3fc69e77bace57f14cf0d7c177bd8 (git) |
|||||||
|
|||||||||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/ext4/super.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "7bf46ff83a0ef11836e38ebd72cdc5107209342d",
"status": "affected",
"version": "8b67f04ab9de5d8f3a71aef72bf02c995a506db5",
"versionType": "git"
},
{
"lessThan": "b2bac84fde28fb6a88817b8b761abda17a1d300b",
"status": "affected",
"version": "8b67f04ab9de5d8f3a71aef72bf02c995a506db5",
"versionType": "git"
},
{
"lessThan": "e651294218d2684302ee5ed95ccf381646f3e5b4",
"status": "affected",
"version": "8b67f04ab9de5d8f3a71aef72bf02c995a506db5",
"versionType": "git"
},
{
"lessThan": "01829af7656b56d83682b3491265d583d502e502",
"status": "affected",
"version": "8b67f04ab9de5d8f3a71aef72bf02c995a506db5",
"versionType": "git"
},
{
"lessThan": "2a0cf438320cdb783e0378570744c0ef0d83e934",
"status": "affected",
"version": "8b67f04ab9de5d8f3a71aef72bf02c995a506db5",
"versionType": "git"
},
{
"lessThan": "a6e94557cd05adc82fae0400f6e17745563e5412",
"status": "affected",
"version": "8b67f04ab9de5d8f3a71aef72bf02c995a506db5",
"versionType": "git"
},
{
"lessThan": "8ecb790ea8c3fc69e77bace57f14cf0d7c177bd8",
"status": "affected",
"version": "8b67f04ab9de5d8f3a71aef72bf02c995a506db5",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/ext4/super.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "2.6.36"
},
{
"lessThan": "2.6.36",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.301",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.246",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.158",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.114",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.54",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.17.*",
"status": "unaffected",
"version": "6.17.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.18",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.301",
"versionStartIncluding": "2.6.36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.246",
"versionStartIncluding": "2.6.36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.158",
"versionStartIncluding": "2.6.36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.114",
"versionStartIncluding": "2.6.36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.54",
"versionStartIncluding": "2.6.36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.17.4",
"versionStartIncluding": "2.6.36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18",
"versionStartIncluding": "2.6.36",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-01T06:19:59.495Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/7bf46ff83a0ef11836e38ebd72cdc5107209342d"
},
{
"url": "https://git.kernel.org/stable/c/b2bac84fde28fb6a88817b8b761abda17a1d300b"
},
{
"url": "https://git.kernel.org/stable/c/e651294218d2684302ee5ed95ccf381646f3e5b4"
},
{
"url": "https://git.kernel.org/stable/c/01829af7656b56d83682b3491265d583d502e502"
},
{
"url": "https://git.kernel.org/stable/c/2a0cf438320cdb783e0378570744c0ef0d83e934"
},
{
"url": "https://git.kernel.org/stable/c/a6e94557cd05adc82fae0400f6e17745563e5412"
},
{
"url": "https://git.kernel.org/stable/c/8ecb790ea8c3fc69e77bace57f14cf0d7c177bd8"
}
],
"title": "ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-40198",
"datePublished": "2025-11-12T21:56:33.220Z",
"dateReserved": "2025-04-16T07:20:57.178Z",
"dateUpdated": "2025-12-01T06:19:59.495Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-40198\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-11-12T22:15:46.923\",\"lastModified\":\"2025-11-14T16:42:30.503\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\\n\\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\\nmake sure s_mount_opts is NUL terminated. Harden\\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\\n__nonstring.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/01829af7656b56d83682b3491265d583d502e502\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2a0cf438320cdb783e0378570744c0ef0d83e934\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7bf46ff83a0ef11836e38ebd72cdc5107209342d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8ecb790ea8c3fc69e77bace57f14cf0d7c177bd8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a6e94557cd05adc82fae0400f6e17745563e5412\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b2bac84fde28fb6a88817b8b761abda17a1d300b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e651294218d2684302ee5ed95ccf381646f3e5b4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
CERTFR-2025-AVI-1048
Vulnerability from certfr_avis - Published: 2025-11-28 - Updated: 2025-11-28
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 6.1.158-1~deb11u1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40008"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-40010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40010"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40013"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-40022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40022"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
}
],
"initial_release_date": "2025-11-28T00:00:00",
"last_revision_date": "2025-11-28T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2025-11-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4379-1",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
}
]
}
CERTFR-2026-AVI-0170
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | Public Cloud Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | openSUSE Leap 15.3 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50669"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2023-53814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53814"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2023-53407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53407"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2023-54208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54208"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2023-54039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54039"
},
{
"name": "CVE-2023-53804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53804"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2023-54131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54131"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2022-50779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50779"
},
{
"name": "CVE-2023-54111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54111"
},
{
"name": "CVE-2023-54186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54186"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2023-53803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53803"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2023-53754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53754"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2022-50834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50834"
},
{
"name": "CVE-2022-50809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50809"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2022-50488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50488"
},
{
"name": "CVE-2025-37751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37751"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2023-54021",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54021"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2023-54265",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54265"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2022-50672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50672"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2022-50776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50776"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2023-54018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54018"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-50702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50702"
},
{
"name": "CVE-2023-53786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53786"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2022-50761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50761"
},
{
"name": "CVE-2022-50866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50866"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2022-50676",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50676"
},
{
"name": "CVE-2023-53845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53845"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2022-50622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50622"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2022-50853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50853"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2023-54100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54100"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2025-38243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38243"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2025-38563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38563"
},
{
"name": "CVE-2022-50619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50619"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2023-54213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54213"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2022-50636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50636"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2023-53837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53837"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2024-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54031"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2023-54010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54010"
},
{
"name": "CVE-2022-50774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50774"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2022-50878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50878"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2022-50836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50836"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2022-50846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50846"
},
{
"name": "CVE-2023-54098",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54098"
},
{
"name": "CVE-2025-71076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71076"
},
{
"name": "CVE-2022-50842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50842"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2023-54275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54275"
},
{
"name": "CVE-2023-52923",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52923"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2023-53818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53818"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2023-54305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54305"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-54150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54150"
},
{
"name": "CVE-2023-54199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54199"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38565"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-52433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52433"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2022-50816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50816"
},
{
"name": "CVE-2022-50881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50881"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2023-54205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54205"
},
{
"name": "CVE-2023-53866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53866"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-71080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71080"
},
{
"name": "CVE-2025-71142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71142"
},
{
"name": "CVE-2024-56721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56721"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2022-50724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50724"
},
{
"name": "CVE-2022-50633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50633"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-50859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50859"
},
{
"name": "CVE-2022-50750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50750"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2023-54040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54040"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2023-54214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54214"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-53148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53148"
},
{
"name": "CVE-2023-54090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54090"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-53755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53755"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2023-54079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54079"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54202"
},
{
"name": "CVE-2023-54007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54007"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2022-50781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50781"
},
{
"name": "CVE-2022-50860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50860"
},
{
"name": "CVE-2022-50780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50780"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2022-50829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50829"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2022-50830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50830"
},
{
"name": "CVE-2022-50673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50673"
},
{
"name": "CVE-2023-54274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54274"
},
{
"name": "CVE-2022-50666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50666"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2023-54108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54108"
},
{
"name": "CVE-2022-50745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50745"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2023-54317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54317"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2022-50740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50740"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-50329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50329"
},
{
"name": "CVE-2023-54298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54298"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2022-50822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50822"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2023-54053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54053"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2022-50769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50769"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2023-54295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54295"
},
{
"name": "CVE-2022-50752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50752"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2026-23005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23005"
},
{
"name": "CVE-2025-68215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68215"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2023-53418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53418"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2022-50716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50716"
},
{
"name": "CVE-2022-50698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50698"
},
{
"name": "CVE-2022-50844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50844"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2022-50773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50773"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2022-50848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50848"
},
{
"name": "CVE-2024-36348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36348"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2022-50662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50662"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2023-54243",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54243"
},
{
"name": "CVE-2023-54078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54078"
},
{
"name": "CVE-2022-50819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50819"
},
{
"name": "CVE-2025-71143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71143"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2023-54013",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54013"
},
{
"name": "CVE-2023-54102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54102"
},
{
"name": "CVE-2023-52983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52983"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2024-26935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26935"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2022-50887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50887"
},
{
"name": "CVE-2022-50757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50757"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2023-53820",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53820"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2022-50679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50679"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2024-26832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26832"
},
{
"name": "CVE-2026-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23006"
},
{
"name": "CVE-2022-50839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50839"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2023-54301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54301"
},
{
"name": "CVE-2025-68789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68789"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-38379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38379"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2023-54277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54277"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2023-54046",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54046"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2023-54120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54120"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-38656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38656"
},
{
"name": "CVE-2025-71157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71157"
},
{
"name": "CVE-2023-53783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53783"
},
{
"name": "CVE-2024-56690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56690"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2022-50722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50722"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2022-50728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50728"
},
{
"name": "CVE-2022-50677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50677"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2023-54003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54003"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2023-54321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54321"
},
{
"name": "CVE-2023-53744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53744"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-50718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50718"
},
{
"name": "CVE-2022-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50658"
},
{
"name": "CVE-2023-54009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54009"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2022-50660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50660"
},
{
"name": "CVE-2024-50143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2022-50886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50886"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2023-54097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54097"
},
{
"name": "CVE-2024-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53149"
},
{
"name": "CVE-2022-50626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50626"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2023-53853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53853"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2022-48838",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48838"
},
{
"name": "CVE-2022-50885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50885"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-53840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53840"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2023-53464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53464"
},
{
"name": "CVE-2022-50661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50661"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-54284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54284"
},
{
"name": "CVE-2022-50824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50824"
},
{
"name": "CVE-2025-71141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71141"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-71101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71101"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2023-53788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53788"
},
{
"name": "CVE-2022-50580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50580"
},
{
"name": "CVE-2023-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53215"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2022-50864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50864"
},
{
"name": "CVE-2023-53832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53832"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2022-50715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50715"
},
{
"name": "CVE-2022-50735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50735"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-71145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71145"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2023-54015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54015"
},
{
"name": "CVE-2025-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22047"
},
{
"name": "CVE-2023-54122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54122"
},
{
"name": "CVE-2023-54119",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54119"
},
{
"name": "CVE-2022-50675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50675"
},
{
"name": "CVE-2023-54159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54159"
},
{
"name": "CVE-2022-50751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50751"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-54245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54245"
},
{
"name": "CVE-2022-50347",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50347"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2023-54146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54146"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2023-54118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54118"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2022-50699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50699"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2023-53990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53990"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2023-54058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54058"
},
{
"name": "CVE-2023-52874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52874"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2023-53417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53417"
},
{
"name": "CVE-2026-22993",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2023-54311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54311"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-54126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54126"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2022-50697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50697"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-22985",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22985"
},
{
"name": "CVE-2023-54084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54084"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2022-50615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50615"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2023-53747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53747"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2022-50617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50617"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2022-50656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50656"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2023-54036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54036"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2023-53412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53412"
},
{
"name": "CVE-2022-50719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50719"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2022-50763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50763"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2022-50727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50727"
},
{
"name": "CVE-2022-50629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50629"
},
{
"name": "CVE-2022-50872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50872"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2023-54197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54197"
},
{
"name": "CVE-2023-54244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54244"
},
{
"name": "CVE-2022-50865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50865"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2022-50845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50845"
},
{
"name": "CVE-2022-50754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50754"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2022-50856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50856"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54055"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2023-53991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53991"
},
{
"name": "CVE-2022-50861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50861"
},
{
"name": "CVE-2022-50882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50882"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2022-50832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50832"
},
{
"name": "CVE-2022-50638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50638"
},
{
"name": "CVE-2023-52525",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52525"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2023-53811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53811"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-54286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54286"
},
{
"name": "CVE-2023-54269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54269"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2022-50849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50849"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2022-50760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50760"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2022-50858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50858"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2022-50888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50888"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71099"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2022-50747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50747"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2024-36349",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36349"
},
{
"name": "CVE-2023-53226",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53226"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2022-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50782"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2022-50826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50826"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2023-53746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53746"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2022-50749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50749"
},
{
"name": "CVE-2022-50618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50618"
},
{
"name": "CVE-2023-54218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54218"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23010"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2025-38209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38209"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2022-50777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50777"
},
{
"name": "CVE-2025-71156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71156"
},
{
"name": "CVE-2023-53862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53862"
},
{
"name": "CVE-2026-22988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22988"
},
{
"name": "CVE-2022-50664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50664"
},
{
"name": "CVE-2023-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50756"
},
{
"name": "CVE-2022-50643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50643"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2023-54020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54020"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2023-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52999"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2023-54130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54130"
},
{
"name": "CVE-2022-50625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50625"
},
{
"name": "CVE-2023-54012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54012"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2023-54294",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54294"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-50614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50614"
},
{
"name": "CVE-2023-54050",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54050"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2022-50670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50670"
},
{
"name": "CVE-2022-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50868"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2023-54287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54287"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2022-50652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50652"
},
{
"name": "CVE-2022-50732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50732"
},
{
"name": "CVE-2023-54198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54198"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2022-50653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50653"
},
{
"name": "CVE-2023-54252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54252"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2023-54123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54123"
},
{
"name": "CVE-2023-54236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54236"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2022-50835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50835"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2023-54260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54260"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2022-50786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50786"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2023-53830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53830"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2025-39836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39836"
},
{
"name": "CVE-2023-54325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54325"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2022-50770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50770"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2022-50755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50755"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0170",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0472-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260472-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0471-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260471-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0474-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260474-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0473-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260473-1"
},
{
"published_at": "2026-02-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0411-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260411-1"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0447-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260447-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0475-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260475-1"
}
]
}
CERTFR-2025-AVI-1140
Vulnerability from certfr_avis - Published: 2025-12-26 - Updated: 2025-12-26
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | Public Cloud Module | Public Cloud Module 15-SP7 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5, SP5 LTSS et SP5 LTSS Extended Security | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | Public Cloud Module | Public Cloud Module 15-SP6 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Real Time 15 SP5 et SP5 LTSS | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5, ESPOS 15 SP5 et LTSS 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11 SP4 et SP4 LTSS EXTREME CORE | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP7 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5, SP5 LTSS et SP5 LTSS Extended Security",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP6",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5 et SP5 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP6",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5, ESPOS 15 SP5 et LTSS 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4 et SP4 LTSS EXTREME CORE",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2022-50368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50368"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2023-53431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53431"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2022-50494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50494"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2023-53369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53369"
},
{
"name": "CVE-2023-53641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53641"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2022-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50280"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2022-50578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50578"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2022-50364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50364"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-53542",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53542"
},
{
"name": "CVE-2023-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53229"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2022-50569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50569"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2022-50545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50545"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2023-53597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53597"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2025-12-26T00:00:00",
"last_revision_date": "2025-12-26T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1140",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4506-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254506-1"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4517-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254517-1"
},
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4507-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254507-1"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4515-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254515-1"
},
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4505-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254505-1"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4516-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254516-1"
},
{
"published_at": "2025-12-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4521-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254521-1"
}
]
}
CERTFR-2026-AVI-0225
Vulnerability from certfr_avis - Published: 2026-02-27 - Updated: 2026-02-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 LTSS | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Micro Extras | SUSE Linux Micro Extras 6.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.0",
"product": {
"name": "SUSE Linux Micro Extras",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50669"
},
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2023-53814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53814"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2023-53407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53407"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-54208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54208"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2023-54039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54039"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-53804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53804"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2023-53797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53797"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2023-54131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54131"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2022-50779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50779"
},
{
"name": "CVE-2023-54000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54000"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2023-54111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54111"
},
{
"name": "CVE-2023-54186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54186"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2023-53803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53803"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2023-53754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53754"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2022-50834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50834"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2022-50809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50809"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2023-53821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53821"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2023-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53799"
},
{
"name": "CVE-2025-37751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37751"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2023-54021",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54021"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2022-50672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50672"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2022-50776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50776"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53995"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2023-54255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54255"
},
{
"name": "CVE-2023-54018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54018"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-50702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50702"
},
{
"name": "CVE-2023-53786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53786"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2022-50761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50761"
},
{
"name": "CVE-2022-50866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50866"
},
{
"name": "CVE-2023-54297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54297"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2023-54313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54313"
},
{
"name": "CVE-2023-53759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53759"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53845"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2023-53994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53994"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-50622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50622"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-54143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54143"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2023-53813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53813"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2022-50853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50853"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2023-54100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54100"
},
{
"name": "CVE-2023-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53864"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2023-54246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54246"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2025-38243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38243"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2025-38563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38563"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2022-50619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50619"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2023-54106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54106"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53793"
},
{
"name": "CVE-2023-54213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54213"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2022-50636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50636"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2023-54283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54283"
},
{
"name": "CVE-2023-53837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53837"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2023-54066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54066"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-54117",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54117"
},
{
"name": "CVE-2023-53999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53999"
},
{
"name": "CVE-2024-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54031"
},
{
"name": "CVE-2023-54038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54038"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2023-54010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54010"
},
{
"name": "CVE-2022-50774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50774"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2022-50878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50878"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2023-54251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54251"
},
{
"name": "CVE-2022-50836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50836"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2022-50846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50846"
},
{
"name": "CVE-2023-54098",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54098"
},
{
"name": "CVE-2023-53750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53750"
},
{
"name": "CVE-2025-71076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71076"
},
{
"name": "CVE-2022-50842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50842"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2023-54037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54037"
},
{
"name": "CVE-2023-54275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54275"
},
{
"name": "CVE-2023-52923",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52923"
},
{
"name": "CVE-2023-53815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53815"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2023-53818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53818"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2023-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54031"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2023-54305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54305"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-53989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53989"
},
{
"name": "CVE-2023-54150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54150"
},
{
"name": "CVE-2023-54199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54199"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2023-54254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54254"
},
{
"name": "CVE-2025-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38565"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-54312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54312"
},
{
"name": "CVE-2023-52433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52433"
},
{
"name": "CVE-2023-54094",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54094"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2022-50881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50881"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2023-54205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54205"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2023-53866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53866"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2023-54164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54164"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-71080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71080"
},
{
"name": "CVE-2025-71142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71142"
},
{
"name": "CVE-2024-56721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56721"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2023-54316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54316"
},
{
"name": "CVE-2022-50724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50724"
},
{
"name": "CVE-2022-50633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50633"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2023-54089",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54089"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2022-50859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50859"
},
{
"name": "CVE-2022-50750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50750"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2023-54040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54040"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2023-54214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54214"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-54322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54322"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2023-54155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54155"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2023-54090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54090"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-54276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54276"
},
{
"name": "CVE-2023-53755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53755"
},
{
"name": "CVE-2023-42752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42752"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2023-54079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54079"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54202"
},
{
"name": "CVE-2023-54007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54007"
},
{
"name": "CVE-2023-54278",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54278"
},
{
"name": "CVE-2023-54215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54215"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2023-53777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53777"
},
{
"name": "CVE-2022-50781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50781"
},
{
"name": "CVE-2023-54133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54133"
},
{
"name": "CVE-2022-50860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50860"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2023-54148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54148"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2022-50829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50829"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2022-50830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50830"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-50673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50673"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2023-53848",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53848"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2023-54274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54274"
},
{
"name": "CVE-2023-53828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53828"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2022-50666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50666"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2023-54108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54108"
},
{
"name": "CVE-2022-50745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50745"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2023-54317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54317"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2022-50740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50740"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2023-54298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54298"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2022-50822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50822"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2023-54053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54053"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2022-50769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50769"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2023-54295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54295"
},
{
"name": "CVE-2022-50752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50752"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2026-23005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23005"
},
{
"name": "CVE-2025-68215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68215"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2023-54223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54223"
},
{
"name": "CVE-2023-53418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53418"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2022-50716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50716"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-50698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50698"
},
{
"name": "CVE-2022-50844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50844"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2023-54101",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54101"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2022-50773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50773"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2022-50848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50848"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2024-36348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36348"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2022-50662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50662"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2023-54243",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54243"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2023-54078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54078"
},
{
"name": "CVE-2022-50819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50819"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-71143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71143"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2023-54013",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54013"
},
{
"name": "CVE-2023-54102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54102"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2023-54093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54093"
},
{
"name": "CVE-2023-53839",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53839"
},
{
"name": "CVE-2023-53752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53752"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2022-50887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50887"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2023-54318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54318"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2022-50757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50757"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2023-53820",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53820"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2023-54225",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54225"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2022-50679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50679"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2023-54194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54194"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2024-26832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26832"
},
{
"name": "CVE-2026-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23006"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2022-50839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50839"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2023-54301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54301"
},
{
"name": "CVE-2025-68789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68789"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2023-53843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53843"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38379"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2023-54277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54277"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2023-54046",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54046"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2023-54120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54120"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-71157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71157"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2023-53783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53783"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2022-50722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50722"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2022-50728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50728"
},
{
"name": "CVE-2022-50677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50677"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2023-54003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54003"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2024-46854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46854"
},
{
"name": "CVE-2023-54291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54291"
},
{
"name": "CVE-2023-54321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54321"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53865"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53744"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2023-53823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53823"
},
{
"name": "CVE-2022-50718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50718"
},
{
"name": "CVE-2022-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50658"
},
{
"name": "CVE-2023-54009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54009"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2022-50660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50660"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2024-50143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
},
{
"name": "CVE-2023-54241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54241"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2023-54017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54017"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2023-53787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53787"
},
{
"name": "CVE-2022-50886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50886"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2023-54097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54097"
},
{
"name": "CVE-2024-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53149"
},
{
"name": "CVE-2022-50626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50626"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2023-54154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54154"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2023-54141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54141"
},
{
"name": "CVE-2022-50885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50885"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-53840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53840"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2022-50661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50661"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2023-54284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54284"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2022-50824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50824"
},
{
"name": "CVE-2025-71141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71141"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2023-53795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53795"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-71101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71101"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2023-53788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53788"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2023-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53215"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2022-50864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50864"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2023-53832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53832"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2022-50715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50715"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2023-54210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54210"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2022-50735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50735"
},
{
"name": "CVE-2023-54030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54030"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2023-53997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53997"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-71145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71145"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2023-54015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54015"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22047"
},
{
"name": "CVE-2023-54224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54224"
},
{
"name": "CVE-2023-54235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54235"
},
{
"name": "CVE-2023-54122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54122"
},
{
"name": "CVE-2023-54119",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54119"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2022-50675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50675"
},
{
"name": "CVE-2023-54159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54159"
},
{
"name": "CVE-2022-50751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50751"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-54245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54245"
},
{
"name": "CVE-2023-54032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54032"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2023-53856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53856"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2023-54146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54146"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2023-54118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54118"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2023-53782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53782"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2023-54069",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54069"
},
{
"name": "CVE-2022-50699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50699"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2023-53990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53990"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2023-54027",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54027"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2023-54058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54058"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2023-53417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53417"
},
{
"name": "CVE-2026-22993",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22993"
},
{
"name": "CVE-2023-53851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53851"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2023-54311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54311"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-54126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54126"
},
{
"name": "CVE-2023-53841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53841"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54267"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2022-50697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50697"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-22985",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22985"
},
{
"name": "CVE-2023-54006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54006"
},
{
"name": "CVE-2023-53784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53784"
},
{
"name": "CVE-2023-54084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54084"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2022-50615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50615"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2023-53747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53747"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2022-50617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50617"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2022-50656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50656"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2023-54036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54036"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2023-53412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53412"
},
{
"name": "CVE-2022-50719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50719"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2022-50763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50763"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2022-50727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50727"
},
{
"name": "CVE-2022-50629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50629"
},
{
"name": "CVE-2023-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53762"
},
{
"name": "CVE-2022-50872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50872"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2023-53861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53861"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2023-54197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54197"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2023-54137",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54137"
},
{
"name": "CVE-2023-54244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54244"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2022-50845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50845"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2022-50754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50754"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2022-50856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50856"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2023-54055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54055"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2023-53991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53991"
},
{
"name": "CVE-2023-54229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54229"
},
{
"name": "CVE-2022-50861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50861"
},
{
"name": "CVE-2022-50882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50882"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2022-50832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50832"
},
{
"name": "CVE-2023-53807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53807"
},
{
"name": "CVE-2022-50638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50638"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2023-53811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53811"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2023-54178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54178"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-54286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54286"
},
{
"name": "CVE-2023-54269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54269"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2022-50849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50849"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2022-50760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50760"
},
{
"name": "CVE-2023-54008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54008"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2022-50858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50858"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2022-50888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50888"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2023-54258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54258"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71099"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2023-54221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54221"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2022-50747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50747"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2024-36349",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36349"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2022-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50782"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2022-50826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50826"
},
{
"name": "CVE-2023-54060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54060"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2023-53778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53778"
},
{
"name": "CVE-2023-53746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53746"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2022-50749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50749"
},
{
"name": "CVE-2023-54240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54240"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2022-50618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50618"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2023-54070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54070"
},
{
"name": "CVE-2023-54204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54204"
},
{
"name": "CVE-2026-23010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23010"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2025-38209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38209"
},
{
"name": "CVE-2023-54303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54303"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2022-50777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50777"
},
{
"name": "CVE-2025-71156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71156"
},
{
"name": "CVE-2023-53862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53862"
},
{
"name": "CVE-2026-22988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22988"
},
{
"name": "CVE-2022-50664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50664"
},
{
"name": "CVE-2022-50643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50643"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2023-54020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54020"
},
{
"name": "CVE-2023-54135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54135"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2023-54130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54130"
},
{
"name": "CVE-2023-54314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54314"
},
{
"name": "CVE-2022-50625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50625"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2023-54113",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54113"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2023-53836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53836"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2023-53857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53857"
},
{
"name": "CVE-2023-53860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53860"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2023-54169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54169"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2023-54281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54281"
},
{
"name": "CVE-2023-54080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54080"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2023-54294",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54294"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2022-50614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50614"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2023-54050",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54050"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2022-50670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50670"
},
{
"name": "CVE-2023-54022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54022"
},
{
"name": "CVE-2022-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50868"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2023-54296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54296"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2023-54287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54287"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2022-50652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50652"
},
{
"name": "CVE-2022-50732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50732"
},
{
"name": "CVE-2023-54220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54220"
},
{
"name": "CVE-2023-54198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54198"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2023-54209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54209"
},
{
"name": "CVE-2022-50653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50653"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-54252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54252"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2023-54123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54123"
},
{
"name": "CVE-2023-54236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54236"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2022-50835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50835"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2023-54260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54260"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2023-53831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53831"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2023-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53768"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2023-53830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53830"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2023-54099",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54099"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-39836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39836"
},
{
"name": "CVE-2023-54325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54325"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2023-54005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54005"
},
{
"name": "CVE-2022-50770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50770"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2022-50755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50755"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-02-27T00:00:00",
"last_revision_date": "2026-02-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0225",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20465-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620465-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20457-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620457-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20461-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620461-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20477-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620477-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20459-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620459-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20468-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620468-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20471-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620471-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20464-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620464-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20470-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620470-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0617-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260617-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20458-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620458-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20456-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620456-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20473-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620473-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20463-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620463-1"
},
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0587-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260587-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20467-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620467-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20466-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620466-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20478-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620478-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20476-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620476-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20462-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620462-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20460-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620460-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20469-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620469-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20479-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620479-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20472-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620472-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20455-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620455-1"
}
]
}
CERTFR-2025-AVI-1140
Vulnerability from certfr_avis - Published: 2025-12-26 - Updated: 2025-12-26
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | Public Cloud Module | Public Cloud Module 15-SP7 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5, SP5 LTSS et SP5 LTSS Extended Security | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | Public Cloud Module | Public Cloud Module 15-SP6 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Real Time 15 SP5 et SP5 LTSS | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5, ESPOS 15 SP5 et LTSS 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11 SP4 et SP4 LTSS EXTREME CORE | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP7 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5, SP5 LTSS et SP5 LTSS Extended Security",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP6",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5 et SP5 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP6",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5, ESPOS 15 SP5 et LTSS 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4 et SP4 LTSS EXTREME CORE",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2022-50368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50368"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2023-53431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53431"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2022-50494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50494"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2023-53369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53369"
},
{
"name": "CVE-2023-53641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53641"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2022-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50280"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2022-50578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50578"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2022-50364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50364"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-53542",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53542"
},
{
"name": "CVE-2023-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53229"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2022-50569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50569"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2022-50545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50545"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2023-53597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53597"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2025-12-26T00:00:00",
"last_revision_date": "2025-12-26T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1140",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4506-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254506-1"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4517-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254517-1"
},
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4507-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254507-1"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4515-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254515-1"
},
{
"published_at": "2025-12-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4505-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254505-1"
},
{
"published_at": "2025-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4516-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254516-1"
},
{
"published_at": "2025-12-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4521-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254521-1"
}
]
}
CERTFR-2026-AVI-0194
Vulnerability from certfr_avis - Published: 2026-02-20 - Updated: 2026-02-20
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-40151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40151"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2022-49698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49698"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40041"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-20T00:00:00",
"last_revision_date": "2026-02-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0194",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8048-1",
"url": "https://ubuntu.com/security/notices/USN-8048-1"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-5",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8052-1",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-7",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-5",
"url": "https://ubuntu.com/security/notices/USN-8033-5"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-6",
"url": "https://ubuntu.com/security/notices/USN-8033-6"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-3",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-5",
"url": "https://ubuntu.com/security/notices/USN-7990-5"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-2",
"url": "https://ubuntu.com/security/notices/USN-8029-2"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8034-2",
"url": "https://ubuntu.com/security/notices/USN-8034-2"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-4",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-3",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"published_at": "2026-02-18",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-2",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-6",
"url": "https://ubuntu.com/security/notices/USN-8028-6"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-7",
"url": "https://ubuntu.com/security/notices/USN-8033-7"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-8",
"url": "https://ubuntu.com/security/notices/USN-8033-8"
}
]
}
CERTFR-2026-AVI-0170
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | Public Cloud Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | openSUSE Leap 15.3 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50669"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2023-53814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53814"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2023-53407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53407"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2023-54208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54208"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2023-54039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54039"
},
{
"name": "CVE-2023-53804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53804"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2023-54131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54131"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2022-50779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50779"
},
{
"name": "CVE-2023-54111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54111"
},
{
"name": "CVE-2023-54186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54186"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2023-53803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53803"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2023-53754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53754"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2022-50834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50834"
},
{
"name": "CVE-2022-50809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50809"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2022-50488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50488"
},
{
"name": "CVE-2025-37751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37751"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2023-54021",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54021"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2023-54265",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54265"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2022-50672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50672"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2022-50776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50776"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2023-54018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54018"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-50702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50702"
},
{
"name": "CVE-2023-53786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53786"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2022-50761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50761"
},
{
"name": "CVE-2022-50866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50866"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2022-50676",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50676"
},
{
"name": "CVE-2023-53845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53845"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2022-50622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50622"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2022-50853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50853"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2023-54100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54100"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2025-38243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38243"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2025-38563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38563"
},
{
"name": "CVE-2022-50619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50619"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2023-54213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54213"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2022-50636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50636"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2023-53837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53837"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2024-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54031"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2023-54010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54010"
},
{
"name": "CVE-2022-50774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50774"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2022-50878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50878"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2022-50836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50836"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2022-50846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50846"
},
{
"name": "CVE-2023-54098",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54098"
},
{
"name": "CVE-2025-71076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71076"
},
{
"name": "CVE-2022-50842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50842"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2023-54275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54275"
},
{
"name": "CVE-2023-52923",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52923"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2023-53818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53818"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2023-54305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54305"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-54150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54150"
},
{
"name": "CVE-2023-54199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54199"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38565"
},
{
"name": "CVE-2024-26581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-52433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52433"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2022-50816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50816"
},
{
"name": "CVE-2022-50881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50881"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2023-54205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54205"
},
{
"name": "CVE-2023-53866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53866"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-71080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71080"
},
{
"name": "CVE-2025-71142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71142"
},
{
"name": "CVE-2024-56721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56721"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2022-50724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50724"
},
{
"name": "CVE-2022-50633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50633"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-50859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50859"
},
{
"name": "CVE-2022-50750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50750"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2023-54040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54040"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2023-54214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54214"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-53148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53148"
},
{
"name": "CVE-2023-54090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54090"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-53755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53755"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2023-54079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54079"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54202"
},
{
"name": "CVE-2023-54007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54007"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2024-50040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
},
{
"name": "CVE-2022-50781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50781"
},
{
"name": "CVE-2022-50860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50860"
},
{
"name": "CVE-2022-50780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50780"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2022-50829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50829"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2022-50830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50830"
},
{
"name": "CVE-2022-50673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50673"
},
{
"name": "CVE-2023-54274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54274"
},
{
"name": "CVE-2022-50666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50666"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2023-54108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54108"
},
{
"name": "CVE-2022-50745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50745"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2023-54317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54317"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2022-50740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50740"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-50329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50329"
},
{
"name": "CVE-2023-54298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54298"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2022-50822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50822"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2023-54053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54053"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2022-50769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50769"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2023-54295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54295"
},
{
"name": "CVE-2022-50752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50752"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2026-23005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23005"
},
{
"name": "CVE-2025-68215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68215"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2023-53418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53418"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2022-50716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50716"
},
{
"name": "CVE-2022-50698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50698"
},
{
"name": "CVE-2022-50844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50844"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2022-50773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50773"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2022-50848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50848"
},
{
"name": "CVE-2024-36348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36348"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2022-50662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50662"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2023-54243",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54243"
},
{
"name": "CVE-2023-54078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54078"
},
{
"name": "CVE-2022-50819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50819"
},
{
"name": "CVE-2025-71143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71143"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2023-54013",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54013"
},
{
"name": "CVE-2023-54102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54102"
},
{
"name": "CVE-2023-52983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52983"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2024-26935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26935"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2022-50887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50887"
},
{
"name": "CVE-2022-50757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50757"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2023-53820",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53820"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2022-50679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50679"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2024-26832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26832"
},
{
"name": "CVE-2026-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23006"
},
{
"name": "CVE-2022-50839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50839"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2023-54301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54301"
},
{
"name": "CVE-2025-68789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68789"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-38379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38379"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2023-54277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54277"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2023-54046",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54046"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2023-54120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54120"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-38656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38656"
},
{
"name": "CVE-2025-71157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71157"
},
{
"name": "CVE-2023-53783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53783"
},
{
"name": "CVE-2024-56690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56690"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2022-50722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50722"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2022-50728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50728"
},
{
"name": "CVE-2022-50677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50677"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2023-54003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54003"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2023-54321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54321"
},
{
"name": "CVE-2023-53744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53744"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-50718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50718"
},
{
"name": "CVE-2022-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50658"
},
{
"name": "CVE-2023-54009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54009"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2022-50660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50660"
},
{
"name": "CVE-2024-50143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2022-50886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50886"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2023-54097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54097"
},
{
"name": "CVE-2024-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53149"
},
{
"name": "CVE-2022-50626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50626"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2023-53853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53853"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2022-48838",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48838"
},
{
"name": "CVE-2022-50885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50885"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-53840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53840"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2023-53464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53464"
},
{
"name": "CVE-2022-50661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50661"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-54284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54284"
},
{
"name": "CVE-2022-50824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50824"
},
{
"name": "CVE-2025-71141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71141"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-71101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71101"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2023-53788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53788"
},
{
"name": "CVE-2022-50580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50580"
},
{
"name": "CVE-2023-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53215"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2022-50864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50864"
},
{
"name": "CVE-2023-53832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53832"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2022-50715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50715"
},
{
"name": "CVE-2022-50735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50735"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-71145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71145"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2023-54015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54015"
},
{
"name": "CVE-2025-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22047"
},
{
"name": "CVE-2023-54122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54122"
},
{
"name": "CVE-2023-54119",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54119"
},
{
"name": "CVE-2022-50675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50675"
},
{
"name": "CVE-2023-54159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54159"
},
{
"name": "CVE-2022-50751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50751"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-54245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54245"
},
{
"name": "CVE-2022-50347",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50347"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2023-54146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54146"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2023-54118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54118"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2022-50699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50699"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2023-53990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53990"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2023-54058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54058"
},
{
"name": "CVE-2023-52874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52874"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2023-53417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53417"
},
{
"name": "CVE-2026-22993",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2023-54311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54311"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-54126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54126"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2022-50697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50697"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-22985",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22985"
},
{
"name": "CVE-2023-54084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54084"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2022-50615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50615"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2023-53747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53747"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2022-50617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50617"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2022-50656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50656"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2023-54036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54036"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2023-53412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53412"
},
{
"name": "CVE-2022-50719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50719"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2022-50763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50763"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2022-50727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50727"
},
{
"name": "CVE-2022-50629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50629"
},
{
"name": "CVE-2022-50872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50872"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2023-54197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54197"
},
{
"name": "CVE-2023-54244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54244"
},
{
"name": "CVE-2022-50865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50865"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2022-50845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50845"
},
{
"name": "CVE-2022-50754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50754"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2022-50856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50856"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54055"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2023-53991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53991"
},
{
"name": "CVE-2022-50861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50861"
},
{
"name": "CVE-2022-50882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50882"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2022-50832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50832"
},
{
"name": "CVE-2022-50638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50638"
},
{
"name": "CVE-2023-52525",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52525"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2023-53811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53811"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-54286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54286"
},
{
"name": "CVE-2023-54269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54269"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2022-50849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50849"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2022-50760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50760"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2022-50858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50858"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2022-50888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50888"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71099"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2022-50747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50747"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2024-36349",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36349"
},
{
"name": "CVE-2023-53226",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53226"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2022-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50782"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2022-50826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50826"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2023-53746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53746"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2022-50749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50749"
},
{
"name": "CVE-2022-50618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50618"
},
{
"name": "CVE-2023-54218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54218"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23010"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2025-38209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38209"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2022-50777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50777"
},
{
"name": "CVE-2025-71156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71156"
},
{
"name": "CVE-2023-53862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53862"
},
{
"name": "CVE-2026-22988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22988"
},
{
"name": "CVE-2022-50664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50664"
},
{
"name": "CVE-2023-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50756"
},
{
"name": "CVE-2022-50643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50643"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2023-54020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54020"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2023-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52999"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2023-54130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54130"
},
{
"name": "CVE-2022-50625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50625"
},
{
"name": "CVE-2023-54012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54012"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2024-44987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2023-54294",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54294"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-50614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50614"
},
{
"name": "CVE-2023-54050",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54050"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2022-50670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50670"
},
{
"name": "CVE-2022-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50868"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2023-54287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54287"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2022-50652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50652"
},
{
"name": "CVE-2022-50732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50732"
},
{
"name": "CVE-2023-54198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54198"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2022-50653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50653"
},
{
"name": "CVE-2023-54252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54252"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2023-54123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54123"
},
{
"name": "CVE-2023-54236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54236"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2022-50835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50835"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2023-54260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54260"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2022-50786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50786"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2023-53830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53830"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2025-39836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39836"
},
{
"name": "CVE-2023-54325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54325"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2022-50770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50770"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2022-50755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50755"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0170",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0472-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260472-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0471-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260471-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0474-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260474-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0473-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260473-1"
},
{
"published_at": "2026-02-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0411-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260411-1"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0447-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260447-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0475-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260475-1"
}
]
}
CERTFR-2026-AVI-0227
Vulnerability from certfr_avis - Published: 2026-02-27 - Updated: 2026-02-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2024-53217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53217"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2024-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-27T00:00:00",
"last_revision_date": "2026-02-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0227",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-1",
"url": "https://ubuntu.com/security/notices/USN-8060-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-2",
"url": "https://ubuntu.com/security/notices/USN-8059-2"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-8",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-4",
"url": "https://ubuntu.com/security/notices/USN-8060-4"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8052-2",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-2",
"url": "https://ubuntu.com/security/notices/USN-8060-2"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-4",
"url": "https://ubuntu.com/security/notices/USN-8059-4"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-6",
"url": "https://ubuntu.com/security/notices/USN-8059-6"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8061-1",
"url": "https://ubuntu.com/security/notices/USN-8061-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-3",
"url": "https://ubuntu.com/security/notices/USN-8060-3"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-1",
"url": "https://ubuntu.com/security/notices/USN-8059-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-3",
"url": "https://ubuntu.com/security/notices/USN-8029-3"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-5",
"url": "https://ubuntu.com/security/notices/USN-8059-5"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-3",
"url": "https://ubuntu.com/security/notices/USN-8059-3"
},
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-5",
"url": "https://ubuntu.com/security/notices/USN-8015-5"
}
]
}
CERTFR-2025-AVI-1133
Vulnerability from certfr_avis - Published: 2025-12-19 - Updated: 2025-12-19
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | Basesystem Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | Legacy Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | Development Tools Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Desktop 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2025-12-19T00:00:00",
"last_revision_date": "2025-12-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1133",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4393-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254393-1"
},
{
"published_at": "2025-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4422-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254422-1"
}
]
}
CERTFR-2025-AVI-1136
Vulnerability from certfr_avis - Published: 2025-12-19 - Updated: 2025-12-19
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 5.10.247-1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2023-53498",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53498"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-39866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39866"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2024-50143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-38678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38678"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-57947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57947"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40022"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
}
],
"initial_release_date": "2025-12-19T00:00:00",
"last_revision_date": "2025-12-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1136",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2025-12-12",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4404-1",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
}
]
}
CERTFR-2025-AVI-1133
Vulnerability from certfr_avis - Published: 2025-12-19 - Updated: 2025-12-19
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | Basesystem Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | Legacy Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | Development Tools Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Desktop 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2025-12-19T00:00:00",
"last_revision_date": "2025-12-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1133",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4393-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254393-1"
},
{
"published_at": "2025-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:4422-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254422-1"
}
]
}
CERTFR-2025-AVI-1136
Vulnerability from certfr_avis - Published: 2025-12-19 - Updated: 2025-12-19
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 5.10.247-1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2023-53498",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53498"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-39866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39866"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2024-50143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50143"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-38678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38678"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-57947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57947"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40022"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
}
],
"initial_release_date": "2025-12-19T00:00:00",
"last_revision_date": "2025-12-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1136",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2025-12-12",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4404-1",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
}
]
}
CERTFR-2026-AVI-0108
Vulnerability from certfr_avis - Published: 2026-01-30 - Updated: 2026-01-30
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | Public Cloud Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Micro 6.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50669"
},
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2023-53814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53814"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-54208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54208"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2023-54039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54039"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-53804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53804"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2023-53797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53797"
},
{
"name": "CVE-2022-50873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50873"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2023-54131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54131"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2022-50867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50867"
},
{
"name": "CVE-2022-50779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50779"
},
{
"name": "CVE-2023-54000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54000"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2023-54111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54111"
},
{
"name": "CVE-2023-53809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53809"
},
{
"name": "CVE-2023-54186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54186"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2023-53803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53803"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2023-53754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53754"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2022-50834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50834"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2022-50809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50809"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2023-53821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53821"
},
{
"name": "CVE-2023-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53799"
},
{
"name": "CVE-2023-54021",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54021"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2023-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53176"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2022-50672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50672"
},
{
"name": "CVE-2023-53833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53833"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2022-50776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50776"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53995"
},
{
"name": "CVE-2023-54255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54255"
},
{
"name": "CVE-2023-54018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54018"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-50702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50702"
},
{
"name": "CVE-2023-53786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53786"
},
{
"name": "CVE-2022-50761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50761"
},
{
"name": "CVE-2022-50866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50866"
},
{
"name": "CVE-2023-54297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54297"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2023-54313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54313"
},
{
"name": "CVE-2023-53759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53759"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53845"
},
{
"name": "CVE-2023-53994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53994"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-50622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50622"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2022-50883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50883"
},
{
"name": "CVE-2023-54143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54143"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2023-53813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53813"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2022-50853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50853"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2023-54100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54100"
},
{
"name": "CVE-2023-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53864"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2023-54246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54246"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2022-50619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50619"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2023-54106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54106"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53793"
},
{
"name": "CVE-2023-54213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54213"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2022-50636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50636"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2023-54283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54283"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2023-53837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53837"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2023-54066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54066"
},
{
"name": "CVE-2023-53020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53020"
},
{
"name": "CVE-2023-54117",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54117"
},
{
"name": "CVE-2023-53999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53999"
},
{
"name": "CVE-2023-54038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54038"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2023-54010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54010"
},
{
"name": "CVE-2022-50774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50774"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2022-50878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50878"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2023-54251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54251"
},
{
"name": "CVE-2022-50836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50836"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2022-50846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50846"
},
{
"name": "CVE-2023-54098",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54098"
},
{
"name": "CVE-2023-53750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53750"
},
{
"name": "CVE-2022-50842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50842"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2023-54037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54037"
},
{
"name": "CVE-2023-54275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54275"
},
{
"name": "CVE-2023-53815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53815"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2023-53818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53818"
},
{
"name": "CVE-2023-54132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54132"
},
{
"name": "CVE-2023-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54031"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2023-54305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54305"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-53989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53989"
},
{
"name": "CVE-2023-54150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54150"
},
{
"name": "CVE-2023-54199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54199"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2023-54254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54254"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2023-54312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54312"
},
{
"name": "CVE-2023-54094",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54094"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2023-54128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54128"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2022-50881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50881"
},
{
"name": "CVE-2023-54205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54205"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2023-53866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53866"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2023-54164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54164"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2023-54316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54316"
},
{
"name": "CVE-2022-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49975"
},
{
"name": "CVE-2022-50724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50724"
},
{
"name": "CVE-2022-50633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50633"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2023-54089",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54089"
},
{
"name": "CVE-2022-50859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50859"
},
{
"name": "CVE-2022-50750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50750"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-54074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54074"
},
{
"name": "CVE-2023-54040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54040"
},
{
"name": "CVE-2022-50705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50705"
},
{
"name": "CVE-2023-54214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54214"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-54322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54322"
},
{
"name": "CVE-2023-54155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54155"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2023-54090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54090"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-54276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54276"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-68306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68306"
},
{
"name": "CVE-2023-53755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53755"
},
{
"name": "CVE-2023-42752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42752"
},
{
"name": "CVE-2023-54079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54079"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54202"
},
{
"name": "CVE-2023-54007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54007"
},
{
"name": "CVE-2023-54278",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54278"
},
{
"name": "CVE-2023-54215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54215"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2023-53777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53777"
},
{
"name": "CVE-2022-50781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50781"
},
{
"name": "CVE-2023-54133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54133"
},
{
"name": "CVE-2022-50860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50860"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2022-50833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50833"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2023-54148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54148"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2022-50829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50829"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2022-50830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50830"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49546"
},
{
"name": "CVE-2022-50673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50673"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2023-53848",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53848"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2023-54274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54274"
},
{
"name": "CVE-2023-53828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53828"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2022-50666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50666"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2023-54108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54108"
},
{
"name": "CVE-2022-50745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50745"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2023-54317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54317"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2022-50740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50740"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2023-54298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54298"
},
{
"name": "CVE-2022-50822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50822"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2023-54053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54053"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2022-50769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50769"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2023-54295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54295"
},
{
"name": "CVE-2022-50752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50752"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2023-54223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54223"
},
{
"name": "CVE-2023-54175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54175"
},
{
"name": "CVE-2022-50716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50716"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-50698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50698"
},
{
"name": "CVE-2022-50844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50844"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2023-54101",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54101"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2022-50773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50773"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2022-50848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50848"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2022-50662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50662"
},
{
"name": "CVE-2022-50738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50738"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2023-54078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54078"
},
{
"name": "CVE-2022-50819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50819"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2024-57849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57849"
},
{
"name": "CVE-2023-54102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54102"
},
{
"name": "CVE-2022-50723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50723"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2023-54093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54093"
},
{
"name": "CVE-2023-53839",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53839"
},
{
"name": "CVE-2023-53752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53752"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2022-50887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50887"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2023-54318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54318"
},
{
"name": "CVE-2022-50710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50710"
},
{
"name": "CVE-2022-50757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50757"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2023-53820",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53820"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2023-54225",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54225"
},
{
"name": "CVE-2022-50679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50679"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2023-54194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54194"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2022-50839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50839"
},
{
"name": "CVE-2023-54301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54301"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2023-53843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53843"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2024-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53164"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2023-54277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54277"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2023-54046",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54046"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2023-54120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54120"
},
{
"name": "CVE-2025-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38616"
},
{
"name": "CVE-2022-50621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50621"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-53783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53783"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2023-54057",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54057"
},
{
"name": "CVE-2022-50714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50714"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2022-50722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50722"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2022-50728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50728"
},
{
"name": "CVE-2022-50677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50677"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2023-53454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53454"
},
{
"name": "CVE-2023-54003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54003"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2025-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38554"
},
{
"name": "CVE-2023-54291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54291"
},
{
"name": "CVE-2023-54321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54321"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53865"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-54041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54041"
},
{
"name": "CVE-2023-53744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53744"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2023-53823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53823"
},
{
"name": "CVE-2022-50718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50718"
},
{
"name": "CVE-2022-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50658"
},
{
"name": "CVE-2023-54009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54009"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2022-50660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50660"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2023-54241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54241"
},
{
"name": "CVE-2023-54017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54017"
},
{
"name": "CVE-2023-53787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53787"
},
{
"name": "CVE-2022-50886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50886"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2023-54097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54097"
},
{
"name": "CVE-2022-50626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50626"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2023-53801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53801"
},
{
"name": "CVE-2023-54154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54154"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2023-54141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54141"
},
{
"name": "CVE-2022-50885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50885"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2023-53840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53840"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2022-50661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50661"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2023-54284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54284"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2022-50818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50818"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2022-50824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50824"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2023-53795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53795"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2023-53788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53788"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-56590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56590"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2022-50864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50864"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2023-53832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53832"
},
{
"name": "CVE-2023-54226",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54226"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2022-50715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50715"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2022-50665",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50665"
},
{
"name": "CVE-2023-54210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54210"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2022-50735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50735"
},
{
"name": "CVE-2023-54030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54030"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2023-53997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53997"
},
{
"name": "CVE-2023-54015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54015"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2023-54224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54224"
},
{
"name": "CVE-2025-68298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68298"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2023-54235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54235"
},
{
"name": "CVE-2023-54122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54122"
},
{
"name": "CVE-2023-54119",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54119"
},
{
"name": "CVE-2025-68747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68747"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2022-50675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50675"
},
{
"name": "CVE-2023-54159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54159"
},
{
"name": "CVE-2022-50751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50751"
},
{
"name": "CVE-2023-54245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54245"
},
{
"name": "CVE-2023-54032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54032"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2023-54262",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54262"
},
{
"name": "CVE-2023-53856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53856"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2023-54146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54146"
},
{
"name": "CVE-2023-54118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54118"
},
{
"name": "CVE-2023-53782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53782"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2023-54069",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54069"
},
{
"name": "CVE-2022-50699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50699"
},
{
"name": "CVE-2023-53990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53990"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2023-54027",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54027"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2023-54058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54058"
},
{
"name": "CVE-2023-54238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54238"
},
{
"name": "CVE-2023-54114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54114"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2023-53851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53851"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2022-50838",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50838"
},
{
"name": "CVE-2023-54311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54311"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-54126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54126"
},
{
"name": "CVE-2023-53841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53841"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54267"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2022-50879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50879"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2023-54006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54006"
},
{
"name": "CVE-2023-53784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53784"
},
{
"name": "CVE-2023-54084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54084"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2022-50615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50615"
},
{
"name": "CVE-2022-50667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50667"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2023-53747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53747"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2022-50617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50617"
},
{
"name": "CVE-2023-53718",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53718"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2022-50656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50656"
},
{
"name": "CVE-2023-54036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54036"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2022-50768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50768"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2022-50719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50719"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2022-50763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50763"
},
{
"name": "CVE-2022-50727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50727"
},
{
"name": "CVE-2022-50629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50629"
},
{
"name": "CVE-2023-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53762"
},
{
"name": "CVE-2022-50872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50872"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2023-53861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53861"
},
{
"name": "CVE-2023-54197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54197"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2023-54137",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54137"
},
{
"name": "CVE-2023-54244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54244"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2022-50845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50845"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-39963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39963"
},
{
"name": "CVE-2022-50754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50754"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2022-50856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50856"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2023-54055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54055"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2023-53991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53991"
},
{
"name": "CVE-2023-54229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54229"
},
{
"name": "CVE-2022-50861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50861"
},
{
"name": "CVE-2022-50882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50882"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2022-50832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50832"
},
{
"name": "CVE-2023-53807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53807"
},
{
"name": "CVE-2022-50638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50638"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2023-53811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53811"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2023-54178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54178"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-54286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54286"
},
{
"name": "CVE-2023-54269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54269"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2022-50849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50849"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-50760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50760"
},
{
"name": "CVE-2023-54008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54008"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2022-50858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50858"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2022-50888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50888"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2023-54258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54258"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2023-54221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54221"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2022-50747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50747"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2022-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50782"
},
{
"name": "CVE-2022-50826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50826"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2023-54060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54060"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2023-53778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53778"
},
{
"name": "CVE-2023-53746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53746"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2022-50749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50749"
},
{
"name": "CVE-2022-50706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50706"
},
{
"name": "CVE-2023-54240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54240"
},
{
"name": "CVE-2022-50618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50618"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2023-54070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54070"
},
{
"name": "CVE-2023-54204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54204"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-54303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54303"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2022-50777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50777"
},
{
"name": "CVE-2023-53862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53862"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2022-50664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50664"
},
{
"name": "CVE-2022-50701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50701"
},
{
"name": "CVE-2022-50643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50643"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2023-54020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54020"
},
{
"name": "CVE-2023-54135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54135"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2023-54130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54130"
},
{
"name": "CVE-2023-54314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54314"
},
{
"name": "CVE-2022-50625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50625"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2023-54113",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54113"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2023-53836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53836"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2023-53857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53857"
},
{
"name": "CVE-2023-53860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53860"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2023-54169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54169"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2023-54281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54281"
},
{
"name": "CVE-2023-54044",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54044"
},
{
"name": "CVE-2023-54080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54080"
},
{
"name": "CVE-2023-54294",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54294"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2022-50614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50614"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-39682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39682"
},
{
"name": "CVE-2023-54050",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54050"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2022-50670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50670"
},
{
"name": "CVE-2023-54022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54022"
},
{
"name": "CVE-2022-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50868"
},
{
"name": "CVE-2023-54296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54296"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2023-54287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54287"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2023-53769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53769"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2022-50652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50652"
},
{
"name": "CVE-2022-50732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50732"
},
{
"name": "CVE-2023-54220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54220"
},
{
"name": "CVE-2023-54198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54198"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2023-54138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54138"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-54144",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54144"
},
{
"name": "CVE-2023-54209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54209"
},
{
"name": "CVE-2022-50653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50653"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2022-50712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50712"
},
{
"name": "CVE-2023-54252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54252"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2023-54123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54123"
},
{
"name": "CVE-2023-54236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54236"
},
{
"name": "CVE-2022-50835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50835"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2023-54260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54260"
},
{
"name": "CVE-2023-54116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54116"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2023-53831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53831"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2023-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53768"
},
{
"name": "CVE-2023-53830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53830"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2023-54099",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54099"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2022-50847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50847"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2023-54325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54325"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2023-54005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54005"
},
{
"name": "CVE-2022-50770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50770"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2022-50755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50755"
}
],
"initial_release_date": "2026-01-30T00:00:00",
"last_revision_date": "2026-01-30T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0108",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0269-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260269-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0293-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260293-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0315-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260315-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20168-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620168-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0278-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260278-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20169-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620169-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0283-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260283-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20163-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620163-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20164-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620164-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0267-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260267-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20148-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620148-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0284-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260284-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0270-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260270-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0274-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260274-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0317-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260317-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20149-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620149-1"
},
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0305-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260305-1"
},
{
"published_at": "2026-01-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0263-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260263-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20165-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620165-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0316-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260316-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0281-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260281-1"
}
]
}
CERTFR-2026-AVI-0169
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2024-56606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56606"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2024-27078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27078"
},
{
"name": "CVE-2024-56756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2022-49698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49698"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0169",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-06",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-3",
"url": "https://ubuntu.com/security/notices/USN-8015-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-1",
"url": "https://ubuntu.com/security/notices/USN-8031-1"
},
{
"published_at": "2026-02-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-4",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8034-1",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-5",
"url": "https://ubuntu.com/security/notices/USN-7988-5"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-3",
"url": "https://ubuntu.com/security/notices/USN-7990-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-2",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-4",
"url": "https://ubuntu.com/security/notices/USN-8015-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-1",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-2",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-3",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8013-4",
"url": "https://ubuntu.com/security/notices/USN-8013-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-4",
"url": "https://ubuntu.com/security/notices/USN-7990-4"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-4",
"url": "https://ubuntu.com/security/notices/USN-7988-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-1",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8030-1",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-1",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
}
]
}
CERTFR-2025-AVI-1048
Vulnerability from certfr_avis - Published: 2025-11-28 - Updated: 2025-11-28
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 6.1.158-1~deb11u1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40008"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-40010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40010"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40013"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-40022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40022"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
}
],
"initial_release_date": "2025-11-28T00:00:00",
"last_revision_date": "2025-11-28T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2025-11-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4379-1",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
}
]
}
CERTFR-2026-AVI-0059
Vulnerability from certfr_avis - Published: 2026-01-16 - Updated: 2026-01-16
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.0 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise Server High Availability Extension 16.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.2 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.1 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.0 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server High Availability Extension 16.0",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-39897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39897"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39917"
},
{
"name": "CVE-2025-39831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39831"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2026-01-16T00:00:00",
"last_revision_date": "2026-01-16T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0059",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20015-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620015-1"
},
{
"published_at": "2026-01-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0090-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260090-1"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20039-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620039-1"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20059-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620059-1"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20012-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620012-1"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20021-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620021-1"
},
{
"published_at": "2026-01-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0107-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260107-1"
}
]
}
CERTFR-2026-AVI-0108
Vulnerability from certfr_avis - Published: 2026-01-30 - Updated: 2026-01-30
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | Public Cloud Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Micro 6.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50669"
},
{
"name": "CVE-2023-53761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53761"
},
{
"name": "CVE-2023-53814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53814"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-54208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54208"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2023-54039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54039"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-53804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53804"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2023-53797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53797"
},
{
"name": "CVE-2022-50873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50873"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2023-54131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54131"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2022-50867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50867"
},
{
"name": "CVE-2022-50779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50779"
},
{
"name": "CVE-2023-54000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54000"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2023-54111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54111"
},
{
"name": "CVE-2023-53809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53809"
},
{
"name": "CVE-2023-54186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54186"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2023-53803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53803"
},
{
"name": "CVE-2022-50641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50641"
},
{
"name": "CVE-2023-53754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53754"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2022-50834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50834"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2022-50809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50809"
},
{
"name": "CVE-2023-54270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54270"
},
{
"name": "CVE-2023-53821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53821"
},
{
"name": "CVE-2023-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53799"
},
{
"name": "CVE-2023-54021",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54021"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2023-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53176"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2022-50630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50630"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2022-50672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50672"
},
{
"name": "CVE-2023-53833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53833"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2022-50776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50776"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53995"
},
{
"name": "CVE-2023-54255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54255"
},
{
"name": "CVE-2023-54018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54018"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-50702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50702"
},
{
"name": "CVE-2023-53786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53786"
},
{
"name": "CVE-2022-50761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50761"
},
{
"name": "CVE-2022-50866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50866"
},
{
"name": "CVE-2023-54297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54297"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2023-54313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54313"
},
{
"name": "CVE-2023-53759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53759"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53845"
},
{
"name": "CVE-2023-53994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53994"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-50622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50622"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2022-50883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50883"
},
{
"name": "CVE-2023-54143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54143"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2023-53813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53813"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2022-50646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50646"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2022-50853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50853"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2023-54100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54100"
},
{
"name": "CVE-2023-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53864"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2023-54246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54246"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2022-50619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50619"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2023-54106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54106"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53793"
},
{
"name": "CVE-2023-54213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54213"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2022-50636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50636"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2023-54283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54283"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2023-53837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53837"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2023-54066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54066"
},
{
"name": "CVE-2023-53020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53020"
},
{
"name": "CVE-2023-54117",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54117"
},
{
"name": "CVE-2023-53999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53999"
},
{
"name": "CVE-2023-54038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54038"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2023-54010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54010"
},
{
"name": "CVE-2022-50774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50774"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2022-50878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50878"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2023-54251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54251"
},
{
"name": "CVE-2022-50836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50836"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2022-50644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50644"
},
{
"name": "CVE-2022-50846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50846"
},
{
"name": "CVE-2023-54098",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54098"
},
{
"name": "CVE-2023-53750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53750"
},
{
"name": "CVE-2022-50842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50842"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2023-54037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54037"
},
{
"name": "CVE-2023-54275",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54275"
},
{
"name": "CVE-2023-53815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53815"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2022-50668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50668"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2023-53818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53818"
},
{
"name": "CVE-2023-54132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54132"
},
{
"name": "CVE-2023-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54031"
},
{
"name": "CVE-2022-50840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50840"
},
{
"name": "CVE-2023-54305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54305"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-53989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53989"
},
{
"name": "CVE-2023-54150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54150"
},
{
"name": "CVE-2023-54199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54199"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2023-54254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54254"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2023-54312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54312"
},
{
"name": "CVE-2023-54094",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54094"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2022-50821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50821"
},
{
"name": "CVE-2023-54128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54128"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54110"
},
{
"name": "CVE-2022-50881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50881"
},
{
"name": "CVE-2023-54205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54205"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2023-53866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53866"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2023-54164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54164"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2023-54316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54316"
},
{
"name": "CVE-2022-49975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49975"
},
{
"name": "CVE-2022-50724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50724"
},
{
"name": "CVE-2022-50633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50633"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2023-54089",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54089"
},
{
"name": "CVE-2022-50859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50859"
},
{
"name": "CVE-2022-50750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50750"
},
{
"name": "CVE-2022-50726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50726"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2022-50814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50814"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-54074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54074"
},
{
"name": "CVE-2023-54040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54040"
},
{
"name": "CVE-2022-50705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50705"
},
{
"name": "CVE-2023-54214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54214"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-54322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54322"
},
{
"name": "CVE-2023-54155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54155"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2023-54090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54090"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-54276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54276"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-68306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68306"
},
{
"name": "CVE-2023-53755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53755"
},
{
"name": "CVE-2023-42752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42752"
},
{
"name": "CVE-2023-54079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54079"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54202"
},
{
"name": "CVE-2023-54007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54007"
},
{
"name": "CVE-2023-54278",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54278"
},
{
"name": "CVE-2023-54215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54215"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-54024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54024"
},
{
"name": "CVE-2023-53777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53777"
},
{
"name": "CVE-2022-50781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50781"
},
{
"name": "CVE-2023-54133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54133"
},
{
"name": "CVE-2022-50860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50860"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2022-50833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50833"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2022-50649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50649"
},
{
"name": "CVE-2023-54148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54148"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2022-50829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50829"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2022-50830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50830"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49546"
},
{
"name": "CVE-2022-50673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50673"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2023-53848",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53848"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2023-54274",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54274"
},
{
"name": "CVE-2023-53828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53828"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2022-50666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50666"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2023-54108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54108"
},
{
"name": "CVE-2022-50745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50745"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2023-54317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54317"
},
{
"name": "CVE-2022-50736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50736"
},
{
"name": "CVE-2022-50740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50740"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2023-54298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54298"
},
{
"name": "CVE-2022-50822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50822"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2023-54053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54053"
},
{
"name": "CVE-2022-50843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50843"
},
{
"name": "CVE-2022-50769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50769"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2023-54295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54295"
},
{
"name": "CVE-2022-50752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50752"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2023-54223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54223"
},
{
"name": "CVE-2023-54175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54175"
},
{
"name": "CVE-2022-50716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50716"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-50698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50698"
},
{
"name": "CVE-2022-50844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50844"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2023-54101",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54101"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2022-50773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50773"
},
{
"name": "CVE-2022-50758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50758"
},
{
"name": "CVE-2022-50848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50848"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2022-50662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50662"
},
{
"name": "CVE-2022-50738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50738"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2023-54078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54078"
},
{
"name": "CVE-2022-50819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50819"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2024-57849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57849"
},
{
"name": "CVE-2023-54102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54102"
},
{
"name": "CVE-2022-50723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50723"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2023-54093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54093"
},
{
"name": "CVE-2023-53839",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53839"
},
{
"name": "CVE-2023-53752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53752"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2022-50887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50887"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2023-54318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54318"
},
{
"name": "CVE-2022-50710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50710"
},
{
"name": "CVE-2022-50757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50757"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-50827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50827"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2023-53820",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53820"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2023-54225",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54225"
},
{
"name": "CVE-2022-50679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50679"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2023-54194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54194"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2022-50839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50839"
},
{
"name": "CVE-2023-54301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54301"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2023-53843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53843"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2024-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53164"
},
{
"name": "CVE-2022-50744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50744"
},
{
"name": "CVE-2023-54277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54277"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2023-54046",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54046"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2023-54120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54120"
},
{
"name": "CVE-2025-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38616"
},
{
"name": "CVE-2022-50621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50621"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2022-50742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50742"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-53783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53783"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2023-54057",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54057"
},
{
"name": "CVE-2022-50714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50714"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2022-50722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50722"
},
{
"name": "CVE-2022-50709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50709"
},
{
"name": "CVE-2022-50728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50728"
},
{
"name": "CVE-2022-50677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50677"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2023-53454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53454"
},
{
"name": "CVE-2023-54003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54003"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2025-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38554"
},
{
"name": "CVE-2023-54291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54291"
},
{
"name": "CVE-2023-54321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54321"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53865"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-54041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54041"
},
{
"name": "CVE-2023-53744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53744"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2023-53823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53823"
},
{
"name": "CVE-2022-50718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50718"
},
{
"name": "CVE-2022-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50658"
},
{
"name": "CVE-2023-54009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54009"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2022-50660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50660"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2023-54241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54241"
},
{
"name": "CVE-2023-54017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54017"
},
{
"name": "CVE-2023-53787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53787"
},
{
"name": "CVE-2022-50886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50886"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2023-54097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54097"
},
{
"name": "CVE-2022-50626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50626"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2022-50767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50767"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2023-53801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53801"
},
{
"name": "CVE-2023-54154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54154"
},
{
"name": "CVE-2022-50880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50880"
},
{
"name": "CVE-2023-54141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54141"
},
{
"name": "CVE-2022-50885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50885"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2023-53840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53840"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2022-50661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50661"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2023-54284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54284"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2022-50818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50818"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2022-50824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50824"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2023-53795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53795"
},
{
"name": "CVE-2022-50623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50623"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2023-53788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53788"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-56590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56590"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2022-50864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50864"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2023-53832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53832"
},
{
"name": "CVE-2023-54226",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54226"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2022-50715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50715"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2022-50665",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50665"
},
{
"name": "CVE-2023-54210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54210"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2022-50735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50735"
},
{
"name": "CVE-2023-54030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54030"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2023-53997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53997"
},
{
"name": "CVE-2023-54015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54015"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2023-54224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54224"
},
{
"name": "CVE-2025-68298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68298"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2023-54235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54235"
},
{
"name": "CVE-2023-54122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54122"
},
{
"name": "CVE-2023-54119",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54119"
},
{
"name": "CVE-2025-68747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68747"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2022-50675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50675"
},
{
"name": "CVE-2023-54159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54159"
},
{
"name": "CVE-2022-50751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50751"
},
{
"name": "CVE-2023-54245",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54245"
},
{
"name": "CVE-2023-54032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54032"
},
{
"name": "CVE-2023-54168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54168"
},
{
"name": "CVE-2023-54262",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54262"
},
{
"name": "CVE-2023-53856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53856"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2022-50889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50889"
},
{
"name": "CVE-2023-54146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54146"
},
{
"name": "CVE-2023-54118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54118"
},
{
"name": "CVE-2023-53782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53782"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2023-54069",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54069"
},
{
"name": "CVE-2022-50699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50699"
},
{
"name": "CVE-2023-53990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53990"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2023-54027",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54027"
},
{
"name": "CVE-2022-50870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50870"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2023-54058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54058"
},
{
"name": "CVE-2023-54238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54238"
},
{
"name": "CVE-2023-54114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54114"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2023-53851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53851"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2022-50838",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50838"
},
{
"name": "CVE-2023-54311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54311"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-54126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54126"
},
{
"name": "CVE-2023-53841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53841"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54267"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2022-50879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50879"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2022-50733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50733"
},
{
"name": "CVE-2023-54006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54006"
},
{
"name": "CVE-2023-53784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53784"
},
{
"name": "CVE-2023-54084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54084"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2022-50731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50731"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2022-50615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50615"
},
{
"name": "CVE-2022-50667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50667"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2023-53747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53747"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2022-50730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50730"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2022-50617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50617"
},
{
"name": "CVE-2023-53718",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53718"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2022-50656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50656"
},
{
"name": "CVE-2023-54036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54036"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2022-50768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50768"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2022-50823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50823"
},
{
"name": "CVE-2022-50719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50719"
},
{
"name": "CVE-2022-50703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50703"
},
{
"name": "CVE-2022-50763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50763"
},
{
"name": "CVE-2022-50727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50727"
},
{
"name": "CVE-2022-50629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50629"
},
{
"name": "CVE-2023-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53762"
},
{
"name": "CVE-2022-50872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50872"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2023-53861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53861"
},
{
"name": "CVE-2023-54197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54197"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2023-54137",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54137"
},
{
"name": "CVE-2023-54244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54244"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2022-50845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50845"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-39963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39963"
},
{
"name": "CVE-2022-50754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50754"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2022-50856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50856"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2023-54055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54055"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2023-53991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53991"
},
{
"name": "CVE-2023-54229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54229"
},
{
"name": "CVE-2022-50861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50861"
},
{
"name": "CVE-2022-50882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50882"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2022-50832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50832"
},
{
"name": "CVE-2023-53807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53807"
},
{
"name": "CVE-2022-50638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50638"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2023-53811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53811"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2023-54178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54178"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-54286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54286"
},
{
"name": "CVE-2023-54269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54269"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2022-50849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50849"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-50760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50760"
},
{
"name": "CVE-2023-54008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54008"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2022-50858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50858"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2022-50888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50888"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2023-54258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54258"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2022-50640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50640"
},
{
"name": "CVE-2023-54221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54221"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2022-50747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50747"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2022-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50782"
},
{
"name": "CVE-2022-50826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50826"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2023-54060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54060"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-50635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50635"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2023-53778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53778"
},
{
"name": "CVE-2023-53746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53746"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2022-50749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50749"
},
{
"name": "CVE-2022-50706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50706"
},
{
"name": "CVE-2023-54240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54240"
},
{
"name": "CVE-2022-50618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50618"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2022-50678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50678"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2023-54070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54070"
},
{
"name": "CVE-2023-54204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54204"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-54303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54303"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2022-50777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50777"
},
{
"name": "CVE-2023-53862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53862"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2022-50664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50664"
},
{
"name": "CVE-2022-50701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50701"
},
{
"name": "CVE-2022-50643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50643"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2023-54020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54020"
},
{
"name": "CVE-2023-54135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54135"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2023-54130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54130"
},
{
"name": "CVE-2023-54314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54314"
},
{
"name": "CVE-2022-50625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50625"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2023-54113",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54113"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2023-53836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53836"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2023-53857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53857"
},
{
"name": "CVE-2023-53860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53860"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2023-54169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54169"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2023-54281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54281"
},
{
"name": "CVE-2023-54044",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54044"
},
{
"name": "CVE-2023-54080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54080"
},
{
"name": "CVE-2023-54294",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54294"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2022-50614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50614"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-39682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39682"
},
{
"name": "CVE-2023-54050",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54050"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2022-50828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50828"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2022-50670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50670"
},
{
"name": "CVE-2023-54022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54022"
},
{
"name": "CVE-2022-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50868"
},
{
"name": "CVE-2023-54296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54296"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2023-54287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54287"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2023-53769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53769"
},
{
"name": "CVE-2022-50876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50876"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2022-50652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50652"
},
{
"name": "CVE-2022-50732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50732"
},
{
"name": "CVE-2023-54220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54220"
},
{
"name": "CVE-2023-54198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54198"
},
{
"name": "CVE-2022-50671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50671"
},
{
"name": "CVE-2023-54138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54138"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-54144",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54144"
},
{
"name": "CVE-2023-54209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54209"
},
{
"name": "CVE-2022-50653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50653"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2022-50712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50712"
},
{
"name": "CVE-2023-54252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54252"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2023-54123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54123"
},
{
"name": "CVE-2023-54236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54236"
},
{
"name": "CVE-2022-50835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50835"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2023-54260",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54260"
},
{
"name": "CVE-2023-54116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54116"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-50884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50884"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2023-53831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53831"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2023-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53768"
},
{
"name": "CVE-2023-53830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53830"
},
{
"name": "CVE-2022-50850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50850"
},
{
"name": "CVE-2023-54099",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54099"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2022-50847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50847"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2023-54325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54325"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2023-54005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54005"
},
{
"name": "CVE-2022-50770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50770"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2022-50755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50755"
}
],
"initial_release_date": "2026-01-30T00:00:00",
"last_revision_date": "2026-01-30T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0108",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0269-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260269-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0293-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260293-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0315-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260315-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20168-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620168-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0278-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260278-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20169-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620169-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0283-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260283-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20163-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620163-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20164-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620164-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0267-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260267-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20148-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620148-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0284-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260284-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0270-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260270-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0274-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260274-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0317-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260317-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20149-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620149-1"
},
{
"published_at": "2026-01-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0305-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260305-1"
},
{
"published_at": "2026-01-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0263-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260263-1"
},
{
"published_at": "2026-01-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20165-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620165-1"
},
{
"published_at": "2026-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0316-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260316-1"
},
{
"published_at": "2026-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0281-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260281-1"
}
]
}
CERTFR-2026-AVI-0059
Vulnerability from certfr_avis - Published: 2026-01-16 - Updated: 2026-01-16
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.0 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise Server High Availability Extension 16.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.2 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.1 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.0 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server High Availability Extension 16.0",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-39897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39897"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39917"
},
{
"name": "CVE-2025-39831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39831"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2026-01-16T00:00:00",
"last_revision_date": "2026-01-16T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0059",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20015-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620015-1"
},
{
"published_at": "2026-01-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0090-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260090-1"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20039-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620039-1"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20059-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620059-1"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20012-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620012-1"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20021-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620021-1"
},
{
"published_at": "2026-01-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0107-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260107-1"
}
]
}
CERTFR-2026-AVI-0247
Vulnerability from certfr_avis - Published: 2026-03-06 - Updated: 2026-03-06
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | SUSE Linux Micro 6.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server High Availability Extension 16.0 | ||
| SUSE | N/A | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 11 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Micro 6.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server High Availability Extension 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2023-53797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53797"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-68374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68374"
},
{
"name": "CVE-2023-54000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54000"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2023-53821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53821"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2023-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53799"
},
{
"name": "CVE-2025-37751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37751"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-68741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68741"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2025-68359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68359"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53995"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2023-54255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54255"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-54297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54297"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2023-54313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54313"
},
{
"name": "CVE-2023-53759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53759"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2026-22981",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22981"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2023-53994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53994"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2023-54143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54143"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2023-53813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53813"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2023-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53864"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2023-54246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54246"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2025-38243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38243"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2023-54106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54106"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53793"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2023-54283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54283"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2023-54066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54066"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-54117",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54117"
},
{
"name": "CVE-2023-53999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53999"
},
{
"name": "CVE-2024-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54031"
},
{
"name": "CVE-2023-54038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54038"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2023-54251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54251"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2025-38547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38547"
},
{
"name": "CVE-2023-53750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53750"
},
{
"name": "CVE-2025-71076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71076"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2023-54037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54037"
},
{
"name": "CVE-2023-53815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53815"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2023-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54031"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38297"
},
{
"name": "CVE-2023-53989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53989"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2023-54254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54254"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-54312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54312"
},
{
"name": "CVE-2023-54094",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54094"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2023-54164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54164"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-71080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71080"
},
{
"name": "CVE-2025-71142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71142"
},
{
"name": "CVE-2026-22989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22989"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2023-54316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54316"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2023-54089",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54089"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-37955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37955"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-54322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54322"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2023-54155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54155"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-54276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54276"
},
{
"name": "CVE-2023-42752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42752"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54278",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54278"
},
{
"name": "CVE-2023-54215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54215"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-53777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53777"
},
{
"name": "CVE-2023-54133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54133"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-68368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68368"
},
{
"name": "CVE-2023-54148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54148"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2023-53848",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53848"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2023-53828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53828"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2026-23005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23005"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2023-54223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54223"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2023-54101",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54101"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-71143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71143"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2023-54013",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54013"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2023-54093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54093"
},
{
"name": "CVE-2023-53839",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53839"
},
{
"name": "CVE-2023-53752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53752"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2023-54318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54318"
},
{
"name": "CVE-2025-71126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71126"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2023-54225",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54225"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2023-54194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54194"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2026-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23006"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2025-68789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68789"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2023-53843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53843"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38379"
},
{
"name": "CVE-2025-68356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68356"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2022-50717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50717"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-71157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71157"
},
{
"name": "CVE-2025-38505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38505"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2025-37904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37904"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68743"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2025-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38541"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2023-54291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54291"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53865"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53823"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2025-68348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68348"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2023-54241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54241"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2023-54017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54017"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-68376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68376"
},
{
"name": "CVE-2023-53787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53787"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2024-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53149"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-38589",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38589"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2023-54154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54154"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2023-54141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54141"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2025-68341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68341"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2025-68361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68361"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-71141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71141"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2023-53795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53795"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-71101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71101"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-68360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68360"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2023-54210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54210"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2023-54030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54030"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2023-53997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53997"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-71145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71145"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39814"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22047"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2023-54224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54224"
},
{
"name": "CVE-2023-54235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54235"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-54032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54032"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2023-53856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53856"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2023-53782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53782"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2023-54069",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54069"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2023-54027",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54027"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2026-22993",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22993"
},
{
"name": "CVE-2023-53851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53851"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-53841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53841"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54267"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2025-38423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38423"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-22985",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22985"
},
{
"name": "CVE-2023-54006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54006"
},
{
"name": "CVE-2023-53784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53784"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68811"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2026-23002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23002"
},
{
"name": "CVE-2023-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53762"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2023-53861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53861"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2023-54137",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54137"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2026-22986",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22986"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2023-54229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54229"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2023-53807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53807"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2023-54178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54178"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2025-71148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71148"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2023-54008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54008"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2023-54258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54258"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71099"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2023-54221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54221"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-68784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68784"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2023-54060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54060"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2023-53778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53778"
},
{
"name": "CVE-2025-39817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39817"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2025-68792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68792"
},
{
"name": "CVE-2023-54240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54240"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2023-54070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54070"
},
{
"name": "CVE-2023-54204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54204"
},
{
"name": "CVE-2026-23010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23010"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-54303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54303"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2025-71156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71156"
},
{
"name": "CVE-2026-22988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22988"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2023-54135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54135"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2023-54314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54314"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2023-54113",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54113"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2023-53836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53836"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2023-53857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53857"
},
{
"name": "CVE-2023-53860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53860"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2023-54169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54169"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2023-54281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54281"
},
{
"name": "CVE-2023-54080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54080"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-37845",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37845"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2023-54022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54022"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2023-54296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54296"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-68735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68735"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2023-54220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54220"
},
{
"name": "CVE-2023-54209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54209"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2023-53831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53831"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2023-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53768"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2023-54099",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54099"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2023-54005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54005"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-03-06T00:00:00",
"last_revision_date": "2026-03-06T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0247",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0674-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260674-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20520-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620520-1"
},
{
"published_at": "2026-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20556-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620556-1"
},
{
"published_at": "2026-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20555-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620555-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20517-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620517-1"
},
{
"published_at": "2026-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20615-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620615-1"
},
{
"published_at": "2026-03-02",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20558-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620558-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20516-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620516-1"
},
{
"published_at": "2026-03-01",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0713-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260713-1"
},
{
"published_at": "2026-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20570-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620570-1"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0700-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260700-1"
},
{
"published_at": "2026-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20611-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620611-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20498-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620498-1"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0711-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260711-1"
},
{
"published_at": "2026-03-01",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0727-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260727-1"
},
{
"published_at": "2026-03-01",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0734-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260734-1"
},
{
"published_at": "2026-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0688-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260688-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20510-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620510-1"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0707-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260707-1"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0698-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260698-1"
},
{
"published_at": "2026-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0696-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260696-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20518-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620518-1"
},
{
"published_at": "2026-03-02",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0736-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260736-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20496-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620496-1"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0710-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260710-1"
},
{
"published_at": "2026-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20599-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620599-1"
},
{
"published_at": "2026-03-02",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0748-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260748-1"
},
{
"published_at": "2026-03-01",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0725-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260725-1"
},
{
"published_at": "2026-03-02",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0745-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260745-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20519-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620519-1"
},
{
"published_at": "2026-03-01",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0731-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260731-1"
}
]
}
CERTFR-2026-AVI-0169
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2024-56606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56606"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2024-27078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27078"
},
{
"name": "CVE-2024-56756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2022-49698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49698"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0169",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-06",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-3",
"url": "https://ubuntu.com/security/notices/USN-8015-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-1",
"url": "https://ubuntu.com/security/notices/USN-8031-1"
},
{
"published_at": "2026-02-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-4",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8034-1",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-5",
"url": "https://ubuntu.com/security/notices/USN-7988-5"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-3",
"url": "https://ubuntu.com/security/notices/USN-7990-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-2",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-4",
"url": "https://ubuntu.com/security/notices/USN-8015-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-1",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-2",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-3",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8013-4",
"url": "https://ubuntu.com/security/notices/USN-8013-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-4",
"url": "https://ubuntu.com/security/notices/USN-7990-4"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-4",
"url": "https://ubuntu.com/security/notices/USN-7988-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-1",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8030-1",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-1",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
}
]
}
MSRC_CVE-2025-40198
Vulnerability from csaf_microsoft - Published: 2025-11-02 00:00 - Updated: 2025-12-07 01:51Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40198 ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-40198.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()",
"tracking": {
"current_release_date": "2025-12-07T01:51:18.000Z",
"generator": {
"date": "2025-12-07T15:03:05.336Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-40198",
"initial_release_date": "2025-11-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-11-14T01:01:46.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-12-07T01:51:18.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 kernel 6.6.112.1-2",
"product": {
"name": "\u003cazl3 kernel 6.6.112.1-2",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 kernel 6.6.112.1-2",
"product": {
"name": "azl3 kernel 6.6.112.1-2",
"product_id": "20613"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kernel 6.6.112.1-2 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.112.1-2 as a component of Azure Linux 3.0",
"product_id": "20613-17084"
},
"product_reference": "20613",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40198",
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20613-17084"
],
"known_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40198 ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-40198.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-14T01:01:46.000Z",
"details": "6.6.117.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"title": "ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()"
}
]
}
SUSE-SU-2026:20015-1
Vulnerability from csaf_suse - Published: 2025-12-19 16:46 - Updated: 2025-12-19 16:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).\n- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths (bsc#1253455).\n- CVE-2025-40203: listmount: don\u0027t call path_put() under namespace semaphore (bsc#1253457).\n\nThe following non security issues were fixed:\n\n- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn\u0027t implement a\n proper watchdog interface and has many code issues. It only handles\n obscure and obsolete hardware. Stop building and supporting this driver\n (jsc#PED-14062).\n- Fix \"drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\" (bsc#1252923)\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).\n- PCI/ERR: Update device error_state already after reset (stable-fixes).\n- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\" (git-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon port speed set\" (git-fixes).\n- Update config files: enable zstd module decompression (jsc#PED-14115).\n- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).\n- btrfs: do not clear read-only when adding sprout device (bsc#1253238).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- mount: handle NULL values in mnt_ns_release() (bsc#1254308)\n- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).\n- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).\n- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).\n- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).\n- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).\n- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).\n- net: phy: realtek: improve mmd register access for internal PHY\u0027s (jsc#PED-14353).\n- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).\n- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).\n- net: phy: realtek: use string choices helpers (jsc#PED-14353).\n- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)\n- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)\n- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)\n- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).\n- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).\n- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: don\u0027t take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).\n- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).\n- sched/fair: Get rid of sched_domains_curr_level hack for tl-\u003ecpumask() (bsc#1246843).\n- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).\n- sched/fair: Proportional newidle balance (bsc#1248792).\n- sched/fair: Proportional newidle balance -KABI (bsc#1248792).\n- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).\n- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).\n- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).\n- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155)\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).\n- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).\n- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).\n- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).\n- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).\n- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).\n- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).\n- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).\n- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).\n- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).\n- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).\n- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).\n- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).\n- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).\n- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).\n- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).\n- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).\n- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20015-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20015-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620015-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20015-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245498",
"url": "https://bugzilla.suse.com/1245498"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1246843",
"url": "https://bugzilla.suse.com/1246843"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248792",
"url": "https://bugzilla.suse.com/1248792"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249397",
"url": "https://bugzilla.suse.com/1249397"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249977",
"url": "https://bugzilla.suse.com/1249977"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250723",
"url": "https://bugzilla.suse.com/1250723"
},
{
"category": "self",
"summary": "SUSE Bug 1250746",
"url": "https://bugzilla.suse.com/1250746"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251817",
"url": "https://bugzilla.suse.com/1251817"
},
{
"category": "self",
"summary": "SUSE Bug 1252054",
"url": "https://bugzilla.suse.com/1252054"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252301",
"url": "https://bugzilla.suse.com/1252301"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252357",
"url": "https://bugzilla.suse.com/1252357"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252779",
"url": "https://bugzilla.suse.com/1252779"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252901",
"url": "https://bugzilla.suse.com/1252901"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253238",
"url": "https://bugzilla.suse.com/1253238"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253328",
"url": "https://bugzilla.suse.com/1253328"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253405",
"url": "https://bugzilla.suse.com/1253405"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253410",
"url": "https://bugzilla.suse.com/1253410"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253422",
"url": "https://bugzilla.suse.com/1253422"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253426",
"url": "https://bugzilla.suse.com/1253426"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253450",
"url": "https://bugzilla.suse.com/1253450"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253457",
"url": "https://bugzilla.suse.com/1253457"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253622",
"url": "https://bugzilla.suse.com/1253622"
},
{
"category": "self",
"summary": "SUSE Bug 1253624",
"url": "https://bugzilla.suse.com/1253624"
},
{
"category": "self",
"summary": "SUSE Bug 1253635",
"url": "https://bugzilla.suse.com/1253635"
},
{
"category": "self",
"summary": "SUSE Bug 1253643",
"url": "https://bugzilla.suse.com/1253643"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254308",
"url": "https://bugzilla.suse.com/1254308"
},
{
"category": "self",
"summary": "SUSE Bug 1254315",
"url": "https://bugzilla.suse.com/1254315"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39831 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39897 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39917 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39961 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39990 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40165 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40203 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-19T16:46:47Z",
"generator": {
"date": "2025-12-19T16:46:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20015-1",
"initial_release_date": "2025-12-19T16:46:47Z",
"revision_history": [
{
"date": "2025-12-19T16:46:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-syms-6.12.0-160000.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product_id": "kernel-devel-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch",
"product_id": "kernel-docs-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"product_id": "kernel-docs-html-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product_id": "kernel-macros-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-vanilla-6.12.0-160000.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-syms-6.12.0-160000.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x",
"product_id": "kernel-syms-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"product_id": "kernel-zfcpdump-6.12.0-160000.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-syms-6.12.0-160000.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: unshare page tables during VMA split, not before\n\nCurrently, __split_vma() triggers hugetlb page table unsharing through\nvm_ops-\u003emay_split(). This happens before the VMA lock and rmap locks are\ntaken - which is too early, it allows racing VMA-locked page faults in our\nprocess and racing rmap walks from other processes to cause page tables to\nbe shared again before we actually perform the split.\n\nFix it by explicitly calling into the hugetlb unshare logic from\n__split_vma() in the same place where THP splitting also happens. At that\npoint, both the VMA and the rmap(s) are write-locked.\n\nAn annoying detail is that we can now call into the helper\nhugetlb_unshare_pmds() from two different locking contexts:\n\n1. from hugetlb_split(), holding:\n - mmap lock (exclusively)\n - VMA lock\n - file rmap lock (exclusively)\n2. hugetlb_unshare_all_pmds(), which I think is designed to be able to\n call us with only the mmap lock held (in shared mode), but currently\n only runs while holding mmap lock (exclusively) and VMA lock\n\nBackporting note:\nThis commit fixes a racy protection that was introduced in commit\nb30c14cd6102 (\"hugetlb: unshare some PMDs when splitting VMAs\"); that\ncommit claimed to fix an issue introduced in 5.13, but it should actually\nalso go all the way back.\n\n[jannh@google.com: v2]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38084",
"url": "https://www.suse.com/security/cve/CVE-2025-38084"
},
{
"category": "external",
"summary": "SUSE Bug 1245498 for CVE-2025-38084",
"url": "https://bugzilla.suse.com/1245498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38084"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Log an error when close_all_cached_dirs fails\n\nUnder low-memory conditions, close_all_cached_dirs() can\u0027t move the\ndentries to a separate list to dput() them once the locks are dropped.\nThis will result in a \"Dentry still in use\" error, so add an error\nmessage that makes it clear this is what happened:\n\n[ 495.281119] CIFS: VFS: \\\\otters.example.com\\share Out of memory while dropping dentries\n[ 495.281595] ------------[ cut here ]------------\n[ 495.281887] BUG: Dentry ffff888115531138{i=78,n=/} still in use (2) [unmount of cifs cifs]\n[ 495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0\n\nAlso, bail out of looping through all tcons as soon as a single\nallocation fails, since we\u0027re already in trouble, and kmalloc() attempts\nfor subseqeuent tcons are likely to fail just like the first one did.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38321",
"url": "https://www.suse.com/security/cve/CVE-2025-38321"
},
{
"category": "external",
"summary": "SUSE Bug 1246328 for CVE-2025-38321",
"url": "https://bugzilla.suse.com/1246328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbnic: Move phylink resume out of service_task and into open/close\n\nThe fbnic driver was presenting with the following locking assert coming\nout of a PM resume:\n[ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)\n[ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0\n[ 42.208872][ T164] Modules linked in:\n[ 42.209140][ T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)\n[ 42.209496][ T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 42.209861][ T164] RIP: 0010:phylink_resume+0x190/0x1e0\n[ 42.210057][ T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 \u003c0f\u003e 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef\n[ 42.210708][ T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296\n[ 42.210983][ T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000\n[ 42.211235][ T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001\n[ 42.211466][ T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84\n[ 42.211707][ T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000\n[ 42.211997][ T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0\n[ 42.212234][ T164] FS: 00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000\n[ 42.212505][ T164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 42.212704][ T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0\n[ 42.213227][ T164] PKRU: 55555554\n[ 42.213366][ T164] Call Trace:\n[ 42.213483][ T164] \u003cTASK\u003e\n[ 42.213565][ T164] __fbnic_pm_attach.isra.0+0x8e/0xa0\n[ 42.213725][ T164] pci_reset_function+0x116/0x1d0\n[ 42.213895][ T164] reset_store+0xa0/0x100\n[ 42.214025][ T164] ? pci_dev_reset_attr_is_visible+0x50/0x50\n[ 42.214221][ T164] ? sysfs_file_kobj+0xc1/0x1e0\n[ 42.214374][ T164] ? sysfs_kf_write+0x65/0x160\n[ 42.214526][ T164] kernfs_fop_write_iter+0x2f8/0x4c0\n[ 42.214677][ T164] ? kernfs_vma_page_mkwrite+0x1f0/0x1f0\n[ 42.214836][ T164] new_sync_write+0x308/0x6f0\n[ 42.214987][ T164] ? __lock_acquire+0x34c/0x740\n[ 42.215135][ T164] ? new_sync_read+0x6f0/0x6f0\n[ 42.215288][ T164] ? lock_acquire.part.0+0xbc/0x260\n[ 42.215440][ T164] ? ksys_write+0xff/0x200\n[ 42.215590][ T164] ? perf_trace_sched_switch+0x6d0/0x6d0\n[ 42.215742][ T164] vfs_write+0x65e/0xbb0\n[ 42.215876][ T164] ksys_write+0xff/0x200\n[ 42.215994][ T164] ? __ia32_sys_read+0xc0/0xc0\n[ 42.216141][ T164] ? do_user_addr_fault+0x269/0x9f0\n[ 42.216292][ T164] ? rcu_is_watching+0x15/0xd0\n[ 42.216442][ T164] do_syscall_64+0xbb/0x360\n[ 42.216591][ T164] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[ 42.216784][ T164] RIP: 0033:0x7f0dc8ea9986\n\nA bit of digging showed that we were invoking the phylink_resume as a part\nof the fbnic_up path when we were enabling the service task while not\nholding the RTNL lock. We should be enabling this sooner as a part of the\nndo_open path and then just letting the service task come online later.\nThis will help to enforce the correct locking and brings the phylink\ninterface online at the same time as the network interface, instead of at a\nlater time.\n\nI tested this on QEMU to verify this was working by putting the system to\nsleep using \"echo mem \u003e /sys/power/state\" to put the system to sleep in the\nguest and then using the command \"system_wakeup\" in the QEMU monitor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39831",
"url": "https://www.suse.com/security/cve/CVE-2025-39831"
},
{
"category": "external",
"summary": "SUSE Bug 1249977 for CVE-2025-39831",
"url": "https://bugzilla.suse.com/1249977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39897"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: xilinx: axienet: Add error handling for RX metadata pointer retrieval\n\nAdd proper error checking for dmaengine_desc_get_metadata_ptr() which\ncan return an error pointer and lead to potential crashes or undefined\nbehaviour if the pointer retrieval fails.\n\nProperly handle the error by unmapping DMA buffer, freeing the skb and\nreturning early to prevent further processing with invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39897",
"url": "https://www.suse.com/security/cve/CVE-2025-39897"
},
{
"category": "external",
"summary": "SUSE Bug 1250746 for CVE-2025-39897",
"url": "https://bugzilla.suse.com/1250746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39897"
},
{
"cve": "CVE-2025-39917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt\n\nStanislav reported that in bpf_crypto_crypt() the destination dynptr\u0027s\nsize is not validated to be at least as large as the source dynptr\u0027s\nsize before calling into the crypto backend with \u0027len = src_len\u0027. This\ncan result in an OOB write when the destination is smaller than the\nsource.\n\nConcretely, in mentioned function, psrc and pdst are both linear\nbuffers fetched from each dynptr:\n\n psrc = __bpf_dynptr_data(src, src_len);\n [...]\n pdst = __bpf_dynptr_data_rw(dst, dst_len);\n [...]\n err = decrypt ?\n ctx-\u003etype-\u003edecrypt(ctx-\u003etfm, psrc, pdst, src_len, piv) :\n ctx-\u003etype-\u003eencrypt(ctx-\u003etfm, psrc, pdst, src_len, piv);\n\nThe crypto backend expects pdst to be large enough with a src_len length\nthat can be written. Add an additional src_len \u003e dst_len check and bail\nout if it\u0027s the case. Note that these kfuncs are accessible under root\nprivileges only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39917",
"url": "https://www.suse.com/security/cve/CVE-2025-39917"
},
{
"category": "external",
"summary": "SUSE Bug 1250723 for CVE-2025-39917",
"url": "https://bugzilla.suse.com/1250723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39917"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39961"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd/pgtbl: Fix possible race while increase page table level\n\nThe AMD IOMMU host page table implementation supports dynamic page table levels\n(up to 6 levels), starting with a 3-level configuration that expands based on\nIOVA address. The kernel maintains a root pointer and current page table level\nto enable proper page table walks in alloc_pte()/fetch_pte() operations.\n\nThe IOMMU IOVA allocator initially starts with 32-bit address and onces its\nexhuasted it switches to 64-bit address (max address is determined based\non IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU\ndriver increases page table level.\n\nBut in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads\npgtable-\u003e[root/mode] without lock. So its possible that in exteme corner case,\nwhen increase_address_space() is updating pgtable-\u003e[root/mode], fetch_pte()\nreads wrong page table level (pgtable-\u003emode). It does compare the value with\nlevel encoded in page table and returns NULL. This will result is\niommu_unmap ops to fail and upper layer may retry/log WARN_ON.\n\nCPU 0 CPU 1\n------ ------\nmap pages unmap pages\nalloc_pte() -\u003e increase_address_space() iommu_v1_unmap_pages() -\u003e fetch_pte()\n pgtable-\u003eroot = pte (new root value)\n READ pgtable-\u003e[mode/root]\n\t\t\t\t\t Reads new root, old mode\n Updates mode (pgtable-\u003emode += 1)\n\nSince Page table level updates are infrequent and already synchronized with a\nspinlock, implement seqcount to enable lock-free read operations on the read path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39961",
"url": "https://www.suse.com/security/cve/CVE-2025-39961"
},
{
"category": "external",
"summary": "SUSE Bug 1251817 for CVE-2025-39961",
"url": "https://bugzilla.suse.com/1251817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39961"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-39990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check the helper function is valid in get_helper_proto\n\nkernel test robot reported verifier bug [1] where the helper func\npointer could be NULL due to disabled config option.\n\nAs Alexei suggested we could check on that in get_helper_proto\ndirectly. Marking tail_call helper func with BPF_PTR_POISON,\nbecause it is unused by design.\n\n [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39990",
"url": "https://www.suse.com/security/cve/CVE-2025-39990"
},
{
"category": "external",
"summary": "SUSE Bug 1252054 for CVE-2025-39990",
"url": "https://bugzilla.suse.com/1252054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39990"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: Take a reference on the task in struct vhost_task.\n\nvhost_task_create() creates a task and keeps a reference to its\ntask_struct. That task may exit early via a signal and its task_struct\nwill be released.\nA pending vhost_task_wake() will then attempt to wake the task and\naccess a task_struct which is no longer there.\n\nAcquire a reference on the task_struct while creating the thread and\nrelease the reference while the struct vhost_task itself is removed.\nIf the task exits early due to a signal, then the vhost_task_wake() will\nstill access a valid task_struct. The wake is safe and will be skipped\nin this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40024",
"url": "https://www.suse.com/security/cve/CVE-2025-40024"
},
{
"category": "external",
"summary": "SUSE Bug 1252686 for CVE-2025-40024",
"url": "https://bugzilla.suse.com/1252686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40024"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().\n\nmptcp_active_enable() is called from subflow_finish_connect(),\nwhich is icsk-\u003eicsk_af_ops-\u003esk_rx_dst_set() and it\u0027s not always\nunder RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40133",
"url": "https://www.suse.com/security/cve/CVE-2025-40133"
},
{
"category": "external",
"summary": "SUSE Bug 1253328 for CVE-2025-40133",
"url": "https://bugzilla.suse.com/1253328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix NULL pointer dereference in __dm_suspend()\n\nThere is a race condition between dm device suspend and table load that\ncan lead to null pointer dereference. The issue occurs when suspend is\ninvoked before table load completes:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000054\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\nRIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50\nCall Trace:\n \u003cTASK\u003e\n blk_mq_quiesce_queue+0x2c/0x50\n dm_stop_queue+0xd/0x20\n __dm_suspend+0x130/0x330\n dm_suspend+0x11a/0x180\n dev_suspend+0x27e/0x560\n ctl_ioctl+0x4cf/0x850\n dm_ctl_ioctl+0xd/0x20\n vfs_ioctl+0x1d/0x50\n __se_sys_ioctl+0x9b/0xc0\n __x64_sys_ioctl+0x19/0x30\n x64_sys_call+0x2c4a/0x4620\n do_syscall_64+0x9e/0x1b0\n\nThe issue can be triggered as below:\n\nT1 \t\t\t\t\t\tT2\ndm_suspend\t\t\t\t\ttable_load\n__dm_suspend\t\t\t\t\tdm_setup_md_queue\n\t\t\t\t\t\tdm_mq_init_request_queue\n\t\t\t\t\t\tblk_mq_init_allocated_queue\n\t\t\t\t\t\t=\u003e q-\u003emq_ops = set-\u003eops; (1)\ndm_stop_queue / dm_wait_for_completion\n=\u003e q-\u003etag_set NULL pointer!\t(2)\n\t\t\t\t\t\t=\u003e q-\u003etag_set = set; (3)\n\nFix this by checking if a valid table (map) exists before performing\nrequest-based suspend and waiting for target I/O. When map is NULL,\nskip these table-dependent suspend steps.\n\nEven when map is NULL, no I/O can reach any target because there is\nno table loaded; I/O submitted in this state will fail early in the\nDM layer. Skipping the table-dependent suspend logic in this case\nis safe and avoids NULL pointer dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40134",
"url": "https://www.suse.com/security/cve/CVE-2025-40134"
},
{
"category": "external",
"summary": "SUSE Bug 1253386 for CVE-2025-40134",
"url": "https://bugzilla.suse.com/1253386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix SGI cleanup on unbind\n\nThe driver incorrectly determines SGI vs SPI interrupts by checking IRQ\nnumber \u003c 16, which fails with dynamic IRQ allocation. During unbind,\nthis causes improper SGI cleanup leading to kernel crash.\n\nAdd explicit irq_type field to pdata for reliable identification of SGI\ninterrupts (type-2) and only clean up SGI resources when appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40161",
"url": "https://www.suse.com/security/cve/CVE-2025-40161"
},
{
"category": "external",
"summary": "SUSE Bug 1253410 for CVE-2025-40161",
"url": "https://bugzilla.suse.com/1253410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus-\u003edai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40162",
"url": "https://www.suse.com/security/cve/CVE-2025-40162"
},
{
"category": "external",
"summary": "SUSE Bug 1253422 for CVE-2025-40162",
"url": "https://bugzilla.suse.com/1253422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40165"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nxp: imx8-isi: m2m: Fix streaming cleanup on release\n\nIf streamon/streamoff calls are imbalanced, such as when exiting an\napplication with Ctrl+C when streaming, the m2m usage_count will never\nreach zero and the ISI channel won\u0027t be freed. Besides from that, if the\ninput line width is more than 2K, it will trigger a WARN_ON():\n\n[ 59.222120] ------------[ cut here ]------------\n[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654\n[ 59.238569] Modules linked in: ap1302\n[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT\n[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)\n[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120\n[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120\n[ 59.275047] sp : ffff8000848c3b40\n[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00\n[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001\n[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780\n[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000\n[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c\n[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30\n[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420\n[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000\n[ 59.349590] Call trace:\n[ 59.352025] mxc_isi_channel_chain+0xa4/0x120 (P)\n[ 59.356722] mxc_isi_m2m_streamon+0x160/0x20c\n[ 59.361072] v4l_streamon+0x24/0x30\n[ 59.364556] __video_do_ioctl+0x40c/0x4a0\n[ 59.368560] video_usercopy+0x2bc/0x690\n[ 59.372382] video_ioctl2+0x18/0x24\n[ 59.375857] v4l2_ioctl+0x40/0x60\n[ 59.379168] __arm64_sys_ioctl+0xac/0x104\n[ 59.383172] invoke_syscall+0x48/0x104\n[ 59.386916] el0_svc_common.constprop.0+0xc0/0xe0\n[ 59.391613] do_el0_svc+0x1c/0x28\n[ 59.394915] el0_svc+0x34/0xf4\n[ 59.397966] el0t_64_sync_handler+0xa0/0xe4\n[ 59.402143] el0t_64_sync+0x198/0x19c\n[ 59.405801] ---[ end trace 0000000000000000 ]---\n\nAddress this issue by moving the streaming preparation and cleanup to\nthe vb2 .prepare_streaming() and .unprepare_streaming() operations. This\nalso simplifies the driver by allowing direct usage of the\nv4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40165",
"url": "https://www.suse.com/security/cve/CVE-2025-40165"
},
{
"category": "external",
"summary": "SUSE Bug 1253405 for CVE-2025-40165",
"url": "https://bugzilla.suse.com/1253405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40175"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: cleanup remaining SKBs in PTP flows\n\nWhen the driver requests Tx timestamp value, one of the first steps is\nto clone SKB using skb_get. It increases the reference counter for that\nSKB to prevent unexpected freeing by another component.\nHowever, there may be a case where the index is requested, SKB is\nassigned and never consumed by PTP flows - for example due to reset during\nrunning PTP apps.\n\nAdd a check in release timestamping function to verify if the SKB\nassigned to Tx timestamp latch was freed, and release remaining SKBs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40175",
"url": "https://www.suse.com/security/cve/CVE-2025-40175"
},
{
"category": "external",
"summary": "SUSE Bug 1253426 for CVE-2025-40175",
"url": "https://bugzilla.suse.com/1253426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()\n\nIf new_asoc-\u003epeer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0\nand sctp_ulpevent_make_authkey() returns 0, then the variable\nai_ev remains zero and the zero will be dereferenced\nin the sctp_ulpevent_free() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40187",
"url": "https://www.suse.com/security/cve/CVE-2025-40187"
},
{
"category": "external",
"summary": "SUSE Bug 1253647 for CVE-2025-40187",
"url": "https://bugzilla.suse.com/1253647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"ipmi: fix msg stack when IPMI is disconnected\"\n\nThis reverts commit c608966f3f9c2dca596967501d00753282b395fc.\n\nThis patch has a subtle bug that can cause the IPMI driver to go into an\ninfinite loop if the BMC misbehaves in a certain way. Apparently\ncertain BMCs do misbehave this way because several reports have come in\nrecently about this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40192",
"url": "https://www.suse.com/security/cve/CVE-2025-40192"
},
{
"category": "external",
"summary": "SUSE Bug 1253622 for CVE-2025-40192",
"url": "https://bugzilla.suse.com/1253622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: quota: create dedicated workqueue for quota_release_work\n\nThere is a kernel panic due to WARN_ONCE when panic_on_warn is set.\n\nThis issue occurs when writeback is triggered due to sync call for an\nopened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance\nis needed at sync path, flush for quota_release_work is triggered.\nBy default quota_release_work is queued to \"events_unbound\" queue which\ndoes not have WQ_MEM_RECLAIM flag. During f2fs balance \"writeback\"\nworkqueue tries to flush quota_release_work causing kernel panic due to\nMEM_RECLAIM flag mismatch errors.\n\nThis patch creates dedicated workqueue with WQ_MEM_RECLAIM flag\nfor work quota_release_work.\n\n------------[ cut here ]------------\nWARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148\nCall trace:\n check_flush_dependency+0x13c/0x148\n __flush_work+0xd0/0x398\n flush_delayed_work+0x44/0x5c\n dquot_writeback_dquots+0x54/0x318\n f2fs_do_quota_sync+0xb8/0x1a8\n f2fs_write_checkpoint+0x3cc/0x99c\n f2fs_gc+0x190/0x750\n f2fs_balance_fs+0x110/0x168\n f2fs_write_single_data_page+0x474/0x7dc\n f2fs_write_data_pages+0x7d0/0xd0c\n do_writepages+0xe0/0x2f4\n __writeback_single_inode+0x44/0x4ac\n writeback_sb_inodes+0x30c/0x538\n wb_writeback+0xf4/0x440\n wb_workfn+0x128/0x5d4\n process_scheduled_works+0x1c4/0x45c\n worker_thread+0x32c/0x3e8\n kthread+0x11c/0x1b0\n ret_from_fork+0x10/0x20\nKernel panic - not syncing: kernel: panic_on_warn set ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40196",
"url": "https://www.suse.com/security/cve/CVE-2025-40196"
},
{
"category": "external",
"summary": "SUSE Bug 1253624 for CVE-2025-40196",
"url": "https://bugzilla.suse.com/1253624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Clear minor number before put device\n\nThe device minor should not be cleared after the device is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40197",
"url": "https://www.suse.com/security/cve/CVE-2025-40197"
},
{
"category": "external",
"summary": "SUSE Bug 1253450 for CVE-2025-40197",
"url": "https://bugzilla.suse.com/1253450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40203"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlistmount: don\u0027t call path_put() under namespace semaphore\n\nMassage listmount() and make sure we don\u0027t call path_put() under the\nnamespace semaphore. If we put the last reference we\u0027re fscked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40203",
"url": "https://www.suse.com/security/cve/CVE-2025-40203"
},
{
"category": "external",
"summary": "SUSE Bug 1253457 for CVE-2025-40203",
"url": "https://bugzilla.suse.com/1253457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2025:4422-1
Vulnerability from csaf_suse - Published: 2025-12-17 10:52 - Updated: 2025-12-17 10:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n\nThe following non security issues were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: don\u0027t log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Don\u0027t hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Don\u0027t treat ENTER and LEAVE as branches, because they aren\u0027t (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Don\u0027t fail destroy QP and cleanup debugfs earlier (git-fixes).\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes).\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes).\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).\n- RDMA/irdma: Fix SD index calculation (git-fixes).\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: don\u0027t enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/bridge: cdns-dsi: Don\u0027t fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: don\u0027t set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: don\u0027t clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Don\u0027t use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: don\u0027t preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4422,SUSE-SLE-Module-Basesystem-15-SP6-2025-4422,SUSE-SLE-Module-Development-Tools-15-SP6-2025-4422,SUSE-SLE-Module-Legacy-15-SP6-2025-4422,SUSE-SLE-Module-Live-Patching-15-SP6-2025-4422,SUSE-SLE-Product-HA-15-SP6-2025-4422,SUSE-SLE-Product-WE-15-SP6-2025-4422,openSUSE-SLE-15.6-2025-4422",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4422-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4422-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254422-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4422-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-17T10:52:47Z",
"generator": {
"date": "2025-12-17T10:52:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4422-1",
"initial_release_date": "2025-12-17T10:52:47Z",
"revision_history": [
{
"date": "2025-12-17T10:52:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-allwinner-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-altera-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-altera-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-amazon-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-amd-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-amd-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-amlogic-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-apm-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-apm-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-apple-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-apple-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-arm-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-arm-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-broadcom-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-cavium-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-exynos-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-freescale-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-hisilicon-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-lg-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-lg-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-marvell-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-mediatek-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-nvidia-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-qcom-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-renesas-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-rockchip-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-socionext-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-sprd-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"product_id": "dtb-xilinx-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-default-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"product_id": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-default-extra-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-default-optional-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"product_id": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"product_id": "kernel-obs-qa-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.81.1.aarch64",
"product": {
"name": "kernel-syms-6.4.0-150600.23.81.1.aarch64",
"product_id": "kernel-syms-6.4.0-150600.23.81.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"product_id": "reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-150600.23.81.2.noarch",
"product": {
"name": "kernel-devel-6.4.0-150600.23.81.2.noarch",
"product_id": "kernel-devel-6.4.0-150600.23.81.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.4.0-150600.23.81.1.noarch",
"product": {
"name": "kernel-docs-6.4.0-150600.23.81.1.noarch",
"product_id": "kernel-docs-6.4.0-150600.23.81.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"product": {
"name": "kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"product_id": "kernel-docs-html-6.4.0-150600.23.81.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-150600.23.81.2.noarch",
"product": {
"name": "kernel-macros-6.4.0-150600.23.81.2.noarch",
"product_id": "kernel-macros-6.4.0-150600.23.81.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-150600.23.81.2.noarch",
"product": {
"name": "kernel-source-6.4.0-150600.23.81.2.noarch",
"product_id": "kernel-source-6.4.0-150600.23.81.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"product": {
"name": "kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"product_id": "kernel-source-vanilla-6.4.0-150600.23.81.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-debug-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-default-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"product_id": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-default-extra-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-default-optional-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"product_id": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"product_id": "kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"product": {
"name": "kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"product_id": "kernel-syms-6.4.0-150600.23.81.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"product_id": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-default-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-default-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-default-devel-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-default-extra-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-default-optional-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"product_id": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-obs-build-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"product_id": "kernel-obs-qa-6.4.0-150600.23.81.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.81.1.s390x",
"product": {
"name": "kernel-syms-6.4.0-150600.23.81.1.s390x",
"product_id": "kernel-syms-6.4.0-150600.23.81.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"product_id": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-debug-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-debug-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-debug-devel-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"product_id": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-optional-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-default-vdso-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"product_id": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"product_id": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"product_id": "kernel-obs-qa-6.4.0-150600.23.81.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.81.1.x86_64",
"product": {
"name": "kernel-syms-6.4.0-150600.23.81.1.x86_64",
"product_id": "kernel-syms-6.4.0-150600.23.81.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.81.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.81.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.81.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.81.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.81.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-altera-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amazon-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-amd-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-apm-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apple-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-apple-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-arm-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-lg-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-debug-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.81.2.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.81.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.81.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.4.0-150600.23.81.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch"
},
"product_reference": "kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.81.2.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.81.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.81.2.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.4.0-150600.23.81.2.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch"
},
"product_reference": "kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.81.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.81.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-source-6.4.0-150600.23.81.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.81.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.81.2.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.81.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.81.3.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.81.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T10:52:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:20039-1
Vulnerability from csaf_suse - Published: 2026-01-07 12:33 - Updated: 2026-01-07 12:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: net: dst_cache: annotate data-races around dst_cache-\u003ereset_ts (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n- CVE-2025-40206: Add missing bugzilla reference to net fix (bsc#1250237 bsc#1253393).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes)\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes)\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes)\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes)\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes)\n- RDMA/irdma: Fix SD index calculation (git-fixes)\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes)\n- Revert \"drm/tegra: dsi: Clear enable register if powered by bootloader\" (git-fixes).\n- Revert \"wifi: ath10k: avoid unnecessary wait for service ready message\" (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes) (git-fixes).\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-kernel-230",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20039-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20039-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620039-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20039-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-01-07T12:33:45Z",
"generator": {
"date": "2026-01-07T12:33:45Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20039-1",
"initial_release_date": "2026-01-07T12:33:45Z",
"revision_history": [
{
"date": "2026-01-07T12:33:45Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-6.4.0-39.1.noarch",
"product": {
"name": "kernel-devel-rt-6.4.0-39.1.noarch",
"product_id": "kernel-devel-rt-6.4.0-39.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-6.4.0-39.1.noarch",
"product": {
"name": "kernel-source-rt-6.4.0-39.1.noarch",
"product_id": "kernel-source-rt-6.4.0-39.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-6.4.0-39.1.x86_64",
"product": {
"name": "kernel-rt-6.4.0-39.1.x86_64",
"product_id": "kernel-rt-6.4.0-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.4.0-39.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.4.0-39.1.x86_64",
"product_id": "kernel-rt-livepatch-6.4.0-39.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-39.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-39.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64"
},
"product_reference": "kernel-rt-6.4.0-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-6.4.0-39.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-6.4.0-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-39.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.0:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.0:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T12:33:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2025:4517-1
Vulnerability from csaf_suse - Published: 2025-12-23 16:28 - Updated: 2025-12-23 16:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP7 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tas2781: fix getting the wrong device number (git-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() (git-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SEV: Enforce minimum GHCB version requirement for SEV-SNP guests (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- KVM: x86: Have all vendor neutral sub-configs depend on KVM_X86, not just KVM (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes).\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes).\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes).\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).\n- RDMA/irdma: Fix SD index calculation (git-fixes).\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes).\n- Revert \u0027drm/tegra: dsi: Clear enable register if powered by bootloader\u0027 (git-fixes).\n- Revert \u0027wifi: ath10k: avoid unnecessary wait for service ready message\u0027 (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- acpi/hmat: Fix lockdep warning for hmem_register_resource() (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- ata: libata-scsi: Add missing scsi_device_put() in ata_scsi_dev_rescan() (git-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- bpf: Fix test verif_scale_strobemeta_subprogs failure due to llvm19 (bsc#1252368).\n- bpf: improve error message for unsupported helper (bsc#1252370).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- cgroup/cpuset: Remove remote_partition_check() \u0026 make update_cpumasks_hier() handle remote partition (bsc#1241166).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cpuset: Use new excpus for nocpu error check when enabling root partition (bsc#1241166).\n- cpuset: fix failure to enable isolated partition when containing isolcpus (bsc#1241166).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/amdgpu: Release xcp drm memory after unplug (stable-fixes).\n- drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with DC_FP_START (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Add fallback path for YCBCR422 (stable-fixes).\n- drm/amd/display: Allow VRR params change if unsynced with the stream (git-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Enable mst when it\u0027s detected but yet to be initialized (git-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Fix for test crash due to power gating (stable-fixes).\n- drm/amd/display: Fix incorrect return of vblank enable on unconfigured crtc (stable-fixes).\n- drm/amd/display: Fix pbn_div Calculation Error (stable-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting (stable-fixes).\n- drm/amd/display: Init dispclk from bootup clock for DCN314 (stable-fixes).\n- drm/amd/display: Move setup_stream_attribute (stable-fixes).\n- drm/amd/display: Reject modes with too high pixel clock on DCE6-10 (git-fixes).\n- drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off (stable-fixes).\n- drm/amd/display: Set up pixel encoding for YCBCR422 (stable-fixes).\n- drm/amd/display: Support HW cursor 180 rot for any number of pipe splits (stable-fixes).\n- drm/amd/display: Wait until OTG enable state is cleared (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: change dc stream color settings only in atomic commit (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: fix condition for setting timing_adjust_pending (stable-fixes).\n- drm/amd/display: fix dml ms order of operations (stable-fixes).\n- drm/amd/display: incorrect conditions for failing dto calculations (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Check that VPE has reached DPM0 in idle handler (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu/smu: Handle S0ix for vangogh (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Check vcn sram load return value (stable-fixes).\n- drm/amdgpu: Correct the counts of nr_banks and nr_errors (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Fix function header names in amdgpu_connectors.c (git-fixes).\n- drm/amdgpu: Fix unintended error log in VCN5_0_0 (git-fixes).\n- drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2) (stable-fixes).\n- drm/amdgpu: Skip poison aca bank from UE channel (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add range check for RAS bad page address (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM surfaces (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: fix nullptr err of vm_handle_moved (stable-fixes).\n- drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdgpu: remove two invalid BUG_ON()s (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: relax checks for over allocation of save area (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/ast: Blank with VGACR17 sync enable, always clear VGACRB6 sync off (git-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/exynos: exynos7_drm_decon: remove ctx-\u003esuspended (git-fixes).\n- drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/mediatek: Add pm_runtime support for GCE power control (git-fixes).\n- drm/mediatek: Disable AFBC support on Mediatek DRM driver (git-fixes).\n- drm/msm/a6xx: Fix PDC sleep sequence (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm/registers: Generate _HI/LO builders for reg64 (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/panthor: Serialize GPU cache flush operations (stable-fixes).\n- drm/panthor: check bo offset alignment in vm bind (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/sched: Optimise drm_sched_entity_push_job (stable-fixes).\n- drm/sched: avoid killing parent entity on child SIGKILL (stable-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- drm/xe/guc: Add more GuC load error status codes (stable-fixes).\n- drm/xe/guc: Increase GuC crash dump buffer size (stable-fixes).\n- drm/xe/guc: Return an error code if the GuC load fails (stable-fixes).\n- drm/xe/guc: Set upper limit of H2G retries over CTB (stable-fixes).\n- drm/xe/guc: Synchronize Dead CT worker with unbind (git-fixes).\n- drm/xe: Do clean shutdown also when using flr (git-fixes).\n- drm/xe: Do not wake device during a GT reset (git-fixes).\n- drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test (stable-fixes).\n- drm/xe: Move declarations under conditional branch (stable-fixes).\n- drm/xe: Remove duplicate DRM_EXEC selection from Kconfig (git-fixes).\n- drm: panel-backlight-quirks: Make EDID match optional (stable-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- hyperv: Remove the spurious null directive line (git-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- ixgbe: fix memory leak and use-after-free in ixgbe_recovery_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- kabi/severities: drop xfer_to_guest_mode_handle_work.\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- media: videobuf2: forbid remove_bufs when legacy fileio is active (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- nvme-auth: add hkdf_expand_label() (bsc#1247683).\n- nvme-auth: use hkdf_expand_label() (bsc#1247683).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- powerpc: export MIN RMA size (bsc#1236743).\n- powerpc: increase MIN RMA size for CAS negotiation (bsc#1236743, bsc#1252269).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Check for timeout in perf_link test (bsc#1253648).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Remove sockmap_ktls disconnect_after_delete test (bsc#1252365).\n- selftests/bpf: Remove tests for zeroed-array kptr (bsc#1252366).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- selftests/net/forwarding: add slowwait functions (bsc#1254235).\n- selftests/net/lib: no need to record ns name if it already exist (bsc#1254235).\n- selftests/net/lib: update busywait timeout value (bsc#1254235).\n- selftests/net: add lib.sh (bsc#1254235).\n- selftests/net: add variable NS_LIST for lib.sh (bsc#1254235).\n- selftests/net: use tc rule to filter the na packet (bsc#1254235).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- selftests: forwarding.config.sample: Move overrides to lib.sh (bsc#1254235).\n- selftests: forwarding: Add a test for testing lib.sh functionality (bsc#1254235).\n- selftests: forwarding: Avoid failures to source net/lib.sh (bsc#1254235).\n- selftests: forwarding: Change inappropriate log_test_skip() calls (bsc#1254235).\n- selftests: forwarding: Convert log_test() to recognize RET values (bsc#1254235).\n- selftests: forwarding: Have RET track kselftest framework constants (bsc#1254235).\n- selftests: forwarding: Parametrize mausezahn delay (bsc#1254235).\n- selftests: forwarding: Redefine relative_path variable (bsc#1254235).\n- selftests: forwarding: Remove duplicated lib.sh content (bsc#1254235).\n- selftests: forwarding: Support for performance sensitive tests (bsc#1254235).\n- selftests: lib: Define more kselftest exit codes (bsc#1254235).\n- selftests: lib: tc_rule_stats_get(): Move default to argument definition (bsc#1254235).\n- selftests: net: List helper scripts in TEST_FILES Makefile variable (bsc#1254235).\n- selftests: net: Unify code of busywait() and slowwait() (bsc#1254235).\n- selftests: net: add helper for checking if nettest is available (bsc#1254235).\n- selftests: net: lib: Do not overwrite error messages (bsc#1254235).\n- selftests: net: lib: Move logging from forwarding/lib.sh here (bsc#1254235).\n- selftests: net: lib: avoid error removing empty netns name (bsc#1254235).\n- selftests: net: lib: do not set ns var as readonly (bsc#1254235).\n- selftests: net: lib: fix shift count out of range (bsc#1254235).\n- selftests: net: lib: ignore possible errors (bsc#1254235).\n- selftests: net: lib: kill PIDs before del netns (bsc#1254235).\n- selftests: net: lib: remove \u0027ns\u0027 var in setup_ns (bsc#1254235).\n- selftests: net: lib: remove ns from list after clean-up (bsc#1254235).\n- selftests: net: lib: set \u0027i\u0027 as local (bsc#1254235).\n- selftests: net: lib: support errexit with busywait (bsc#1254235).\n- selftests: net: libs: Change variable fallback syntax (bsc#1254235).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/hv: fcopy: Fix incorrect file path conversion (git-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list (stable-fixes).\n- wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in lower bands (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: Track NAN interface start/stop (stable-fixes).\n- wifi: mac80211: do not mark keys for inactive links as uploaded (stable-fixes).\n- wifi: mac80211: fix key tailroom accounting leak (git-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: rtw89: print just once for unknown C2H events (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xe/oa: Fix query mode of operation for OAR/OAC (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4517,SUSE-SLE-Module-Public-Cloud-15-SP7-2025-4517",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4517-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4517-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254517-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4517-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1236743",
"url": "https://bugzilla.suse.com/1236743"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1241166",
"url": "https://bugzilla.suse.com/1241166"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247078",
"url": "https://bugzilla.suse.com/1247078"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1247683",
"url": "https://bugzilla.suse.com/1247683"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252269",
"url": "https://bugzilla.suse.com/1252269"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252365",
"url": "https://bugzilla.suse.com/1252365"
},
{
"category": "self",
"summary": "SUSE Bug 1252366",
"url": "https://bugzilla.suse.com/1252366"
},
{
"category": "self",
"summary": "SUSE Bug 1252368",
"url": "https://bugzilla.suse.com/1252368"
},
{
"category": "self",
"summary": "SUSE Bug 1252370",
"url": "https://bugzilla.suse.com/1252370"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253648",
"url": "https://bugzilla.suse.com/1253648"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254235",
"url": "https://bugzilla.suse.com/1254235"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38360 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38360/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-23T16:28:51Z",
"generator": {
"date": "2025-12-23T16:28:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4517-1",
"initial_release_date": "2025-12-23T16:28:51Z",
"revision_history": [
{
"date": "2025-12-23T16:28:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "cluster-md-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "cluster-md-kmp-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "dlm-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "dlm-kmp-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "gfs2-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "gfs2-kmp-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "kernel-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "kernel-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"product_id": "kernel-azure-devel-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "kernel-azure-extra-6.4.0-150700.20.21.1.aarch64",
"product_id": "kernel-azure-extra-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "kernel-azure-optional-6.4.0-150700.20.21.1.aarch64",
"product_id": "kernel-azure-optional-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "kernel-syms-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "kselftests-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "kselftests-kmp-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "ocfs2-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "ocfs2-kmp-azure-6.4.0-150700.20.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product": {
"name": "reiserfs-kmp-azure-6.4.0-150700.20.21.1.aarch64",
"product_id": "reiserfs-kmp-azure-6.4.0-150700.20.21.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"product": {
"name": "kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"product_id": "kernel-devel-azure-6.4.0-150700.20.21.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"product": {
"name": "kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"product_id": "kernel-source-azure-6.4.0-150700.20.21.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "cluster-md-kmp-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "dlm-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "dlm-kmp-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "gfs2-kmp-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kernel-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "kernel-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"product_id": "kernel-azure-devel-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kernel-azure-extra-6.4.0-150700.20.21.1.x86_64",
"product_id": "kernel-azure-extra-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kernel-azure-optional-6.4.0-150700.20.21.1.x86_64",
"product_id": "kernel-azure-optional-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-vdso-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kernel-azure-vdso-6.4.0-150700.20.21.1.x86_64",
"product_id": "kernel-azure-vdso-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kernel-syms-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "kselftests-kmp-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "ocfs2-kmp-azure-6.4.0-150700.20.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-6.4.0-150700.20.21.1.x86_64",
"product_id": "reiserfs-kmp-azure-6.4.0-150700.20.21.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150700.20.21.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64"
},
"product_reference": "kernel-azure-6.4.0-150700.20.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150700.20.21.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64"
},
"product_reference": "kernel-azure-6.4.0-150700.20.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150700.20.21.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64"
},
"product_reference": "kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150700.20.21.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64"
},
"product_reference": "kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-6.4.0-150700.20.21.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch"
},
"product_reference": "kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-6.4.0-150700.20.21.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch"
},
"product_reference": "kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-6.4.0-150700.20.21.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64"
},
"product_reference": "kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-6.4.0-150700.20.21.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
},
"product_reference": "kernel-syms-azure-6.4.0-150700.20.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38360",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38360"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add more checks for DSC / HUBP ONO guarantees\n\n[WHY]\nFor non-zero DSC instances it\u0027s possible that the HUBP domain required\nto drive it for sequential ONO ASICs isn\u0027t met, potentially causing\nthe logic to the tile to enter an undefined state leading to a system\nhang.\n\n[HOW]\nAdd more checks to ensure that the HUBP domain matching the DSC instance\nis appropriately powered.\n\n(cherry picked from commit da63df07112e5a9857a8d2aaa04255c4206754ec)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38360",
"url": "https://www.suse.com/security/cve/CVE-2025-38360"
},
{
"category": "external",
"summary": "SUSE Bug 1247078 for CVE-2025-38360",
"url": "https://bugzilla.suse.com/1247078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-38360"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.20.21.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-devel-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-source-azure-6.4.0-150700.20.21.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-syms-azure-6.4.0-150700.20.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:28:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:0316-1
Vulnerability from csaf_suse - Published: 2026-01-28 14:35 - Updated: 2026-01-28 14:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-49604,CVE-2025-40074: ip: Fix data-races around sysctl_ip_fwd_use_pmtu (bsc#1238414 bsc#1252794).\n- CVE-2022-50527: drm/amdgpu: Fix size validation for non-exclusive domains (v4) (bsc#1251738).\n- CVE-2022-50625: serial: amba-pl011: avoid SBSA UART accessing DMACR register (bsc#1254559).\n- CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785).\n- CVE-2022-50656: nfc: pn533: Clear nfc_target before being used (bsc#1254745).\n- CVE-2022-50678: wifi: brcmfmac: fix invalid address access when enabling SCAN log level (bsc#1254902).\n- CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576).\n- CVE-2023-53454: HID: multitouch: Correct devm device reference for hidinput input_dev name (bsc#1250759).\n- CVE-2023-53718: ring-buffer: Do not swap cpu_buffer during resize process (bsc#1252564).\n- CVE-2023-53748: media: mediatek: vcodec: Fix potential array out-of-bounds in decoder queue_setup (bsc#1254907).\n- CVE-2023-53765: dm cache: free background tracker\u0027s queued work in btracker_destroy (bsc#1254912).\n- CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751).\n- CVE-2023-53788: ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() (bsc#1254917).\n- CVE-2023-53819: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (bsc#1254712).\n- CVE-2023-53850: iavf: use internal state to free traffic IRQs (bsc#1254677).\n- CVE-2023-54120: Bluetooth: Fix race condition in hidp_session_thread (bsc#1256133).\n- CVE-2023-54214: Bluetooth: L2CAP: Fix potential user-after-free (bsc#1255954).\n- CVE-2023-54236: net/net_failover: fix txq exceeding warning (bsc#1255922).\n- CVE-2023-54286: wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace (bsc#1255803).\n- CVE-2023-54300: wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (bsc#1255790).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38336: ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330 (bsc#1246370).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40035: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (bsc#1252866).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40110: drm/vmwgfx: Fix a null-ptr access in the cursor snooper (bsc#1253275).\n- CVE-2025-40123: bpf: Enforce expected_attach_type for tailcall compatibility (bsc#1253365).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40160: xen/events: Cleanup find_virq() return codes (bsc#1253400).\n- CVE-2025-40164: usbnet: Fix using smp_processor_id() in preemptible code warnings (bsc#1253407).\n- CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40198: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() (bsc#1253453).\n- CVE-2025-40200: Squashfs: reject negative file sizes in squashfs_read_inode() (bsc#1253448).\n- CVE-2025-40215: kABI: xfrm: delete x-\u003etunnel as we delete x (bsc#1254959).\n- CVE-2025-40219: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (bsc#1254518).\n- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).\n- CVE-2025-40240: sctp: avoid NULL dereference when chunk data buffer is missing (bsc#1254869).\n- CVE-2025-40244: hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() (bsc#1255033).\n- CVE-2025-40248: vsock: Ignore signal/timeout on connect() if already established (bsc#1254864).\n- CVE-2025-40252: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() (bsc#1254849).\n- CVE-2025-40269: ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (bsc#1255035).\n- CVE-2025-40275: ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (bsc#1254829).\n- CVE-2025-40278: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak (bsc#1254825).\n- CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak (bsc#1254846).\n- CVE-2025-40283: Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (bsc#1254858).\n- CVE-2025-40304: fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (bsc#1255034).\n- CVE-2025-40308: Bluetooth: bcsp: receive data only if registered (bsc#1255064).\n- CVE-2025-40321: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode (bsc#1254795).\n- CVE-2025-40322: fbdev: bitblit: bound-check glyph index in bit_putcs* (bsc#1255092).\n- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).\n- CVE-2025-40337: net: stmmac: Correctly handle Rx checksum offload errors (bsc#1255081).\n- CVE-2025-40349: hfs: validate record offset in hfsplus_bmap_alloc (bsc#1255280).\n- CVE-2025-40351: hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat() (bsc#1255281).\n- CVE-2025-68206: netfilter: nft_ct: add seqadj extension for natted connections (bsc#1255142).\n- CVE-2025-68340: team: Move team device type change at the end of team_port_add (bsc#1255507).\n\nThe following non security issues were fixed:\n\n- HID: multitouch: Add NULL check in mt_input_configured (bsc#1250759).\n- Squashfs: add additional inode sanity checking (bsc#1253448).\n- drm/amdgpu: Fix potential NULL dereference (bsc#1251238).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-316,SUSE-SLE-Live-Patching-12-SP5-2026-316,SUSE-SLE-SERVER-12-SP5-LTSS-2026-316,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-316",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0316-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0316-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260316-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0316-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1082555",
"url": "https://bugzilla.suse.com/1082555"
},
{
"category": "self",
"summary": "SUSE Bug 1152446",
"url": "https://bugzilla.suse.com/1152446"
},
{
"category": "self",
"summary": "SUSE Bug 1190317",
"url": "https://bugzilla.suse.com/1190317"
},
{
"category": "self",
"summary": "SUSE Bug 1206889",
"url": "https://bugzilla.suse.com/1206889"
},
{
"category": "self",
"summary": "SUSE Bug 1207051",
"url": "https://bugzilla.suse.com/1207051"
},
{
"category": "self",
"summary": "SUSE Bug 1207088",
"url": "https://bugzilla.suse.com/1207088"
},
{
"category": "self",
"summary": "SUSE Bug 1207620",
"url": "https://bugzilla.suse.com/1207620"
},
{
"category": "self",
"summary": "SUSE Bug 1207653",
"url": "https://bugzilla.suse.com/1207653"
},
{
"category": "self",
"summary": "SUSE Bug 1208570",
"url": "https://bugzilla.suse.com/1208570"
},
{
"category": "self",
"summary": "SUSE Bug 1211439",
"url": "https://bugzilla.suse.com/1211439"
},
{
"category": "self",
"summary": "SUSE Bug 1212173",
"url": "https://bugzilla.suse.com/1212173"
},
{
"category": "self",
"summary": "SUSE Bug 1213025",
"url": "https://bugzilla.suse.com/1213025"
},
{
"category": "self",
"summary": "SUSE Bug 1213032",
"url": "https://bugzilla.suse.com/1213032"
},
{
"category": "self",
"summary": "SUSE Bug 1213287",
"url": "https://bugzilla.suse.com/1213287"
},
{
"category": "self",
"summary": "SUSE Bug 1213747",
"url": "https://bugzilla.suse.com/1213747"
},
{
"category": "self",
"summary": "SUSE Bug 1213969",
"url": "https://bugzilla.suse.com/1213969"
},
{
"category": "self",
"summary": "SUSE Bug 1214940",
"url": "https://bugzilla.suse.com/1214940"
},
{
"category": "self",
"summary": "SUSE Bug 1214962",
"url": "https://bugzilla.suse.com/1214962"
},
{
"category": "self",
"summary": "SUSE Bug 1216062",
"url": "https://bugzilla.suse.com/1216062"
},
{
"category": "self",
"summary": "SUSE Bug 1217036",
"url": "https://bugzilla.suse.com/1217036"
},
{
"category": "self",
"summary": "SUSE Bug 1225203",
"url": "https://bugzilla.suse.com/1225203"
},
{
"category": "self",
"summary": "SUSE Bug 1226846",
"url": "https://bugzilla.suse.com/1226846"
},
{
"category": "self",
"summary": "SUSE Bug 1238414",
"url": "https://bugzilla.suse.com/1238414"
},
{
"category": "self",
"summary": "SUSE Bug 1238750",
"url": "https://bugzilla.suse.com/1238750"
},
{
"category": "self",
"summary": "SUSE Bug 1240224",
"url": "https://bugzilla.suse.com/1240224"
},
{
"category": "self",
"summary": "SUSE Bug 1245196",
"url": "https://bugzilla.suse.com/1245196"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246370",
"url": "https://bugzilla.suse.com/1246370"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249991",
"url": "https://bugzilla.suse.com/1249991"
},
{
"category": "self",
"summary": "SUSE Bug 1250759",
"url": "https://bugzilla.suse.com/1250759"
},
{
"category": "self",
"summary": "SUSE Bug 1251238",
"url": "https://bugzilla.suse.com/1251238"
},
{
"category": "self",
"summary": "SUSE Bug 1251738",
"url": "https://bugzilla.suse.com/1251738"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252564",
"url": "https://bugzilla.suse.com/1252564"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252866",
"url": "https://bugzilla.suse.com/1252866"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253365",
"url": "https://bugzilla.suse.com/1253365"
},
{
"category": "self",
"summary": "SUSE Bug 1253400",
"url": "https://bugzilla.suse.com/1253400"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253413",
"url": "https://bugzilla.suse.com/1253413"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253458",
"url": "https://bugzilla.suse.com/1253458"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1254518",
"url": "https://bugzilla.suse.com/1254518"
},
{
"category": "self",
"summary": "SUSE Bug 1254559",
"url": "https://bugzilla.suse.com/1254559"
},
{
"category": "self",
"summary": "SUSE Bug 1254580",
"url": "https://bugzilla.suse.com/1254580"
},
{
"category": "self",
"summary": "SUSE Bug 1254609",
"url": "https://bugzilla.suse.com/1254609"
},
{
"category": "self",
"summary": "SUSE Bug 1254615",
"url": "https://bugzilla.suse.com/1254615"
},
{
"category": "self",
"summary": "SUSE Bug 1254617",
"url": "https://bugzilla.suse.com/1254617"
},
{
"category": "self",
"summary": "SUSE Bug 1254631",
"url": "https://bugzilla.suse.com/1254631"
},
{
"category": "self",
"summary": "SUSE Bug 1254634",
"url": "https://bugzilla.suse.com/1254634"
},
{
"category": "self",
"summary": "SUSE Bug 1254645",
"url": "https://bugzilla.suse.com/1254645"
},
{
"category": "self",
"summary": "SUSE Bug 1254671",
"url": "https://bugzilla.suse.com/1254671"
},
{
"category": "self",
"summary": "SUSE Bug 1254677",
"url": "https://bugzilla.suse.com/1254677"
},
{
"category": "self",
"summary": "SUSE Bug 1254686",
"url": "https://bugzilla.suse.com/1254686"
},
{
"category": "self",
"summary": "SUSE Bug 1254692",
"url": "https://bugzilla.suse.com/1254692"
},
{
"category": "self",
"summary": "SUSE Bug 1254698",
"url": "https://bugzilla.suse.com/1254698"
},
{
"category": "self",
"summary": "SUSE Bug 1254709",
"url": "https://bugzilla.suse.com/1254709"
},
{
"category": "self",
"summary": "SUSE Bug 1254712",
"url": "https://bugzilla.suse.com/1254712"
},
{
"category": "self",
"summary": "SUSE Bug 1254722",
"url": "https://bugzilla.suse.com/1254722"
},
{
"category": "self",
"summary": "SUSE Bug 1254745",
"url": "https://bugzilla.suse.com/1254745"
},
{
"category": "self",
"summary": "SUSE Bug 1254751",
"url": "https://bugzilla.suse.com/1254751"
},
{
"category": "self",
"summary": "SUSE Bug 1254763",
"url": "https://bugzilla.suse.com/1254763"
},
{
"category": "self",
"summary": "SUSE Bug 1254785",
"url": "https://bugzilla.suse.com/1254785"
},
{
"category": "self",
"summary": "SUSE Bug 1254795",
"url": "https://bugzilla.suse.com/1254795"
},
{
"category": "self",
"summary": "SUSE Bug 1254813",
"url": "https://bugzilla.suse.com/1254813"
},
{
"category": "self",
"summary": "SUSE Bug 1254825",
"url": "https://bugzilla.suse.com/1254825"
},
{
"category": "self",
"summary": "SUSE Bug 1254829",
"url": "https://bugzilla.suse.com/1254829"
},
{
"category": "self",
"summary": "SUSE Bug 1254846",
"url": "https://bugzilla.suse.com/1254846"
},
{
"category": "self",
"summary": "SUSE Bug 1254849",
"url": "https://bugzilla.suse.com/1254849"
},
{
"category": "self",
"summary": "SUSE Bug 1254851",
"url": "https://bugzilla.suse.com/1254851"
},
{
"category": "self",
"summary": "SUSE Bug 1254858",
"url": "https://bugzilla.suse.com/1254858"
},
{
"category": "self",
"summary": "SUSE Bug 1254864",
"url": "https://bugzilla.suse.com/1254864"
},
{
"category": "self",
"summary": "SUSE Bug 1254869",
"url": "https://bugzilla.suse.com/1254869"
},
{
"category": "self",
"summary": "SUSE Bug 1254902",
"url": "https://bugzilla.suse.com/1254902"
},
{
"category": "self",
"summary": "SUSE Bug 1254907",
"url": "https://bugzilla.suse.com/1254907"
},
{
"category": "self",
"summary": "SUSE Bug 1254912",
"url": "https://bugzilla.suse.com/1254912"
},
{
"category": "self",
"summary": "SUSE Bug 1254916",
"url": "https://bugzilla.suse.com/1254916"
},
{
"category": "self",
"summary": "SUSE Bug 1254917",
"url": "https://bugzilla.suse.com/1254917"
},
{
"category": "self",
"summary": "SUSE Bug 1254959",
"url": "https://bugzilla.suse.com/1254959"
},
{
"category": "self",
"summary": "SUSE Bug 1254994",
"url": "https://bugzilla.suse.com/1254994"
},
{
"category": "self",
"summary": "SUSE Bug 1255033",
"url": "https://bugzilla.suse.com/1255033"
},
{
"category": "self",
"summary": "SUSE Bug 1255034",
"url": "https://bugzilla.suse.com/1255034"
},
{
"category": "self",
"summary": "SUSE Bug 1255035",
"url": "https://bugzilla.suse.com/1255035"
},
{
"category": "self",
"summary": "SUSE Bug 1255064",
"url": "https://bugzilla.suse.com/1255064"
},
{
"category": "self",
"summary": "SUSE Bug 1255081",
"url": "https://bugzilla.suse.com/1255081"
},
{
"category": "self",
"summary": "SUSE Bug 1255092",
"url": "https://bugzilla.suse.com/1255092"
},
{
"category": "self",
"summary": "SUSE Bug 1255142",
"url": "https://bugzilla.suse.com/1255142"
},
{
"category": "self",
"summary": "SUSE Bug 1255165",
"url": "https://bugzilla.suse.com/1255165"
},
{
"category": "self",
"summary": "SUSE Bug 1255280",
"url": "https://bugzilla.suse.com/1255280"
},
{
"category": "self",
"summary": "SUSE Bug 1255281",
"url": "https://bugzilla.suse.com/1255281"
},
{
"category": "self",
"summary": "SUSE Bug 1255469",
"url": "https://bugzilla.suse.com/1255469"
},
{
"category": "self",
"summary": "SUSE Bug 1255507",
"url": "https://bugzilla.suse.com/1255507"
},
{
"category": "self",
"summary": "SUSE Bug 1255576",
"url": "https://bugzilla.suse.com/1255576"
},
{
"category": "self",
"summary": "SUSE Bug 1255581",
"url": "https://bugzilla.suse.com/1255581"
},
{
"category": "self",
"summary": "SUSE Bug 1255600",
"url": "https://bugzilla.suse.com/1255600"
},
{
"category": "self",
"summary": "SUSE Bug 1255605",
"url": "https://bugzilla.suse.com/1255605"
},
{
"category": "self",
"summary": "SUSE Bug 1255617",
"url": "https://bugzilla.suse.com/1255617"
},
{
"category": "self",
"summary": "SUSE Bug 1255749",
"url": "https://bugzilla.suse.com/1255749"
},
{
"category": "self",
"summary": "SUSE Bug 1255771",
"url": "https://bugzilla.suse.com/1255771"
},
{
"category": "self",
"summary": "SUSE Bug 1255780",
"url": "https://bugzilla.suse.com/1255780"
},
{
"category": "self",
"summary": "SUSE Bug 1255790",
"url": "https://bugzilla.suse.com/1255790"
},
{
"category": "self",
"summary": "SUSE Bug 1255802",
"url": "https://bugzilla.suse.com/1255802"
},
{
"category": "self",
"summary": "SUSE Bug 1255803",
"url": "https://bugzilla.suse.com/1255803"
},
{
"category": "self",
"summary": "SUSE Bug 1255806",
"url": "https://bugzilla.suse.com/1255806"
},
{
"category": "self",
"summary": "SUSE Bug 1255841",
"url": "https://bugzilla.suse.com/1255841"
},
{
"category": "self",
"summary": "SUSE Bug 1255843",
"url": "https://bugzilla.suse.com/1255843"
},
{
"category": "self",
"summary": "SUSE Bug 1255872",
"url": "https://bugzilla.suse.com/1255872"
},
{
"category": "self",
"summary": "SUSE Bug 1255875",
"url": "https://bugzilla.suse.com/1255875"
},
{
"category": "self",
"summary": "SUSE Bug 1255878",
"url": "https://bugzilla.suse.com/1255878"
},
{
"category": "self",
"summary": "SUSE Bug 1255901",
"url": "https://bugzilla.suse.com/1255901"
},
{
"category": "self",
"summary": "SUSE Bug 1255902",
"url": "https://bugzilla.suse.com/1255902"
},
{
"category": "self",
"summary": "SUSE Bug 1255922",
"url": "https://bugzilla.suse.com/1255922"
},
{
"category": "self",
"summary": "SUSE Bug 1255949",
"url": "https://bugzilla.suse.com/1255949"
},
{
"category": "self",
"summary": "SUSE Bug 1255951",
"url": "https://bugzilla.suse.com/1255951"
},
{
"category": "self",
"summary": "SUSE Bug 1255953",
"url": "https://bugzilla.suse.com/1255953"
},
{
"category": "self",
"summary": "SUSE Bug 1255954",
"url": "https://bugzilla.suse.com/1255954"
},
{
"category": "self",
"summary": "SUSE Bug 1255959",
"url": "https://bugzilla.suse.com/1255959"
},
{
"category": "self",
"summary": "SUSE Bug 1255969",
"url": "https://bugzilla.suse.com/1255969"
},
{
"category": "self",
"summary": "SUSE Bug 1255985",
"url": "https://bugzilla.suse.com/1255985"
},
{
"category": "self",
"summary": "SUSE Bug 1255993",
"url": "https://bugzilla.suse.com/1255993"
},
{
"category": "self",
"summary": "SUSE Bug 1255994",
"url": "https://bugzilla.suse.com/1255994"
},
{
"category": "self",
"summary": "SUSE Bug 1256045",
"url": "https://bugzilla.suse.com/1256045"
},
{
"category": "self",
"summary": "SUSE Bug 1256046",
"url": "https://bugzilla.suse.com/1256046"
},
{
"category": "self",
"summary": "SUSE Bug 1256048",
"url": "https://bugzilla.suse.com/1256048"
},
{
"category": "self",
"summary": "SUSE Bug 1256053",
"url": "https://bugzilla.suse.com/1256053"
},
{
"category": "self",
"summary": "SUSE Bug 1256062",
"url": "https://bugzilla.suse.com/1256062"
},
{
"category": "self",
"summary": "SUSE Bug 1256064",
"url": "https://bugzilla.suse.com/1256064"
},
{
"category": "self",
"summary": "SUSE Bug 1256091",
"url": "https://bugzilla.suse.com/1256091"
},
{
"category": "self",
"summary": "SUSE Bug 1256114",
"url": "https://bugzilla.suse.com/1256114"
},
{
"category": "self",
"summary": "SUSE Bug 1256129",
"url": "https://bugzilla.suse.com/1256129"
},
{
"category": "self",
"summary": "SUSE Bug 1256133",
"url": "https://bugzilla.suse.com/1256133"
},
{
"category": "self",
"summary": "SUSE Bug 1256142",
"url": "https://bugzilla.suse.com/1256142"
},
{
"category": "self",
"summary": "SUSE Bug 1256154",
"url": "https://bugzilla.suse.com/1256154"
},
{
"category": "self",
"summary": "SUSE Bug 1256172",
"url": "https://bugzilla.suse.com/1256172"
},
{
"category": "self",
"summary": "SUSE Bug 1256193",
"url": "https://bugzilla.suse.com/1256193"
},
{
"category": "self",
"summary": "SUSE Bug 1256194",
"url": "https://bugzilla.suse.com/1256194"
},
{
"category": "self",
"summary": "SUSE Bug 1256199",
"url": "https://bugzilla.suse.com/1256199"
},
{
"category": "self",
"summary": "SUSE Bug 1256208",
"url": "https://bugzilla.suse.com/1256208"
},
{
"category": "self",
"summary": "SUSE Bug 1256242",
"url": "https://bugzilla.suse.com/1256242"
},
{
"category": "self",
"summary": "SUSE Bug 1256271",
"url": "https://bugzilla.suse.com/1256271"
},
{
"category": "self",
"summary": "SUSE Bug 1256274",
"url": "https://bugzilla.suse.com/1256274"
},
{
"category": "self",
"summary": "SUSE Bug 1256285",
"url": "https://bugzilla.suse.com/1256285"
},
{
"category": "self",
"summary": "SUSE Bug 1256300",
"url": "https://bugzilla.suse.com/1256300"
},
{
"category": "self",
"summary": "SUSE Bug 1256334",
"url": "https://bugzilla.suse.com/1256334"
},
{
"category": "self",
"summary": "SUSE Bug 1256349",
"url": "https://bugzilla.suse.com/1256349"
},
{
"category": "self",
"summary": "SUSE Bug 1256353",
"url": "https://bugzilla.suse.com/1256353"
},
{
"category": "self",
"summary": "SUSE Bug 1256355",
"url": "https://bugzilla.suse.com/1256355"
},
{
"category": "self",
"summary": "SUSE Bug 1256364",
"url": "https://bugzilla.suse.com/1256364"
},
{
"category": "self",
"summary": "SUSE Bug 1256394",
"url": "https://bugzilla.suse.com/1256394"
},
{
"category": "self",
"summary": "SUSE Bug 1256423",
"url": "https://bugzilla.suse.com/1256423"
},
{
"category": "self",
"summary": "SUSE Bug 1256432",
"url": "https://bugzilla.suse.com/1256432"
},
{
"category": "self",
"summary": "SUSE Bug 1256516",
"url": "https://bugzilla.suse.com/1256516"
},
{
"category": "self",
"summary": "SUSE Bug 1256684",
"url": "https://bugzilla.suse.com/1256684"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49546 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49604 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49975 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50527 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50527/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50615 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50625 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50630 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50636 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50638 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50638/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50643 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50646 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50656 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50668 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50677 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50677/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50678 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50678/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50700 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50700/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50706 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50706/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50715 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50728 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50730 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50733 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50747 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50755 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50761 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50779 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50779/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50821 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50824 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50840 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50849 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50850 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50859 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50870 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50879 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-23559 page",
"url": "https://www.suse.com/security/cve/CVE-2023-23559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4132 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53020 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53020/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53176 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53454 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53718 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53746 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53748 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53754 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53765 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53765/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53781 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53786 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53788 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53803 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53809 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53819 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53832 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53832/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53840 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53847 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53847/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53850 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53862 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54014 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54017 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54021 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54032 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54045 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54045/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54051 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54070 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54091 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54095 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54108 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54110 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54119 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54120 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54123 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54130 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54146 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54168 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54170 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54177 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54179 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54186 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54197 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54211 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54211/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54213 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54213/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54214 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54220 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54224 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54226 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54226/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54236 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54260 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54260/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54264 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54266 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54270 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54270/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54271 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54286 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54289 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54294 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54294/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54300 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54300/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54309 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54317 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54317/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38336 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40035 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40123 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40160 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40167 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40170 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40215 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40219 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40233 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40240 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40240/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40244 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40244/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40248 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40248/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40252 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40256 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40256/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40269 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40275 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40275/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40278 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40278/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40279 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40279/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40283 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40304 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40308 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40322 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40331 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40337 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40349 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40351 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68340 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68340/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-01-28T14:35:14Z",
"generator": {
"date": "2026-01-28T14:35:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0316-1",
"initial_release_date": "2026-01-28T14:35:14Z",
"revision_history": [
{
"date": "2026-01-28T14:35:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.290.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.290.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.290.1.aarch64",
"product_id": "kernel-default-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.290.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.290.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.290.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.290.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.290.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.290.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.290.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.290.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.290.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.290.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.290.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.290.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.290.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.290.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.290.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.290.1.noarch",
"product_id": "kernel-devel-4.12.14-122.290.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.290.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.290.1.noarch",
"product_id": "kernel-docs-4.12.14-122.290.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.290.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.290.1.noarch",
"product_id": "kernel-docs-html-4.12.14-122.290.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.290.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.290.1.noarch",
"product_id": "kernel-macros-4.12.14-122.290.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.290.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.290.1.noarch",
"product_id": "kernel-source-4.12.14-122.290.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.290.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.290.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.290.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.290.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.290.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.290.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.290.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.290.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.290.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.290.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.290.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.290.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.290.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.290.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.290.1.s390x",
"product_id": "kernel-syms-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.290.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.290.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.290.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.290.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.290.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.290.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.290.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.290.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.290.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.290.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.290.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.290.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.290.1.x86_64",
"product_id": "kernel-default-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.290.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.290.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.290.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.290.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.290.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.290.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.290.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.290.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.290.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.290.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.290.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.290.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.290.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.290.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.290.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.290.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.290.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.290.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.290.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.290.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.290.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.290.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.290.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.290.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.290.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.290.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.290.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.290.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-49546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49546"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kexec: fix memory leak of elf header buffer\n\nThis is reported by kmemleak detector:\n\nunreferenced object 0xffffc900002a9000 (size 4096):\n comm \"kexec\", pid 14950, jiffies 4295110793 (age 373.951s)\n hex dump (first 32 bytes):\n 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00 .ELF............\n 04 00 3e 00 01 00 00 00 00 00 00 00 00 00 00 00 ..\u003e.............\n backtrace:\n [\u003c0000000016a8ef9f\u003e] __vmalloc_node_range+0x101/0x170\n [\u003c000000002b66b6c0\u003e] __vmalloc_node+0xb4/0x160\n [\u003c00000000ad40107d\u003e] crash_prepare_elf64_headers+0x8e/0xcd0\n [\u003c0000000019afff23\u003e] crash_load_segments+0x260/0x470\n [\u003c0000000019ebe95c\u003e] bzImage64_load+0x814/0xad0\n [\u003c0000000093e16b05\u003e] arch_kexec_kernel_image_load+0x1be/0x2a0\n [\u003c000000009ef2fc88\u003e] kimage_file_alloc_init+0x2ec/0x5a0\n [\u003c0000000038f5a97a\u003e] __do_sys_kexec_file_load+0x28d/0x530\n [\u003c0000000087c19992\u003e] do_syscall_64+0x3b/0x90\n [\u003c0000000066e063a4\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nIn crash_prepare_elf64_headers(), a buffer is allocated via vmalloc() to\nstore elf headers. While it\u0027s not freed back to system correctly when\nkdump kernel is reloaded or unloaded. Then memory leak is caused. Fix it\nby introducing x86 specific function arch_kimage_file_post_load_cleanup(),\nand freeing the buffer there.\n\nAnd also remove the incorrect elf header buffer freeing code. Before\ncalling arch specific kexec_file loading function, the image instance has\nbeen initialized. So \u0027image-\u003eelf_headers\u0027 must be NULL. It doesn\u0027t make\nsense to free the elf header buffer in the place.\n\nThree different people have reported three bugs about the memory leak on\nx86_64 inside Redhat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49546",
"url": "https://www.suse.com/security/cve/CVE-2022-49546"
},
{
"category": "external",
"summary": "SUSE Bug 1238750 for CVE-2022-49546",
"url": "https://bugzilla.suse.com/1238750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2022-49546"
},
{
"cve": "CVE-2022-49604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49604"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip: Fix data-races around sysctl_ip_fwd_use_pmtu.\n\nWhile reading sysctl_ip_fwd_use_pmtu, it can be changed concurrently.\nThus, we need to add READ_ONCE() to its readers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49604",
"url": "https://www.suse.com/security/cve/CVE-2022-49604"
},
{
"category": "external",
"summary": "SUSE Bug 1238414 for CVE-2022-49604",
"url": "https://bugzilla.suse.com/1238414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-49604"
},
{
"cve": "CVE-2022-49975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49975"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Don\u0027t redirect packets with invalid pkt_len\n\nSyzbot found an issue [1]: fq_codel_drop() try to drop a flow whitout any\nskbs, that is, the flow-\u003ehead is null.\nThe root cause, as the [2] says, is because that bpf_prog_test_run_skb()\nrun a bpf prog which redirects empty skbs.\nSo we should determine whether the length of the packet modified by bpf\nprog or others like bpf_prog_test is valid before forwarding it directly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49975",
"url": "https://www.suse.com/security/cve/CVE-2022-49975"
},
{
"category": "external",
"summary": "SUSE Bug 1245196 for CVE-2022-49975",
"url": "https://bugzilla.suse.com/1245196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-49975"
},
{
"cve": "CVE-2022-50527",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50527"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix size validation for non-exclusive domains (v4)\n\nFix amdgpu_bo_validate_size() to check whether the TTM domain manager for the\nrequested memory exists, else we get a kernel oops when dereferencing \"man\".\n\nv2: Make the patch standalone, i.e. not dependent on local patches.\nv3: Preserve old behaviour and just check that the manager pointer is not\n NULL.\nv4: Complain if GTT domain requested and it is uninitialized--most likely a\n bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50527",
"url": "https://www.suse.com/security/cve/CVE-2022-50527"
},
{
"category": "external",
"summary": "SUSE Bug 1251738 for CVE-2022-50527",
"url": "https://bugzilla.suse.com/1251738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50527"
},
{
"cve": "CVE-2022-50615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50615"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()\n\npci_get_device() will increase the reference count for the returned\npci_dev, so snr_uncore_get_mc_dev() will return a pci_dev with its\nreference count increased. We need to call pci_dev_put() to decrease the\nreference count. Let\u0027s add the missing pci_dev_put().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50615",
"url": "https://www.suse.com/security/cve/CVE-2022-50615"
},
{
"category": "external",
"summary": "SUSE Bug 1254580 for CVE-2022-50615",
"url": "https://bugzilla.suse.com/1254580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50615"
},
{
"cve": "CVE-2022-50625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50625"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: amba-pl011: avoid SBSA UART accessing DMACR register\n\nChapter \"B Generic UART\" in \"ARM Server Base System Architecture\" [1]\ndocumentation describes a generic UART interface. Such generic UART\ndoes not support DMA. In current code, sbsa_uart_pops and\namba_pl011_pops share the same stop_rx operation, which will invoke\npl011_dma_rx_stop, leading to an access of the DMACR register. This\ncommit adds a using_rx_dma check in pl011_dma_rx_stop to avoid the\naccess to DMACR register for SBSA UARTs which does not support DMA.\n\nWhen the kernel enables DMA engine with \"CONFIG_DMA_ENGINE=y\", Linux\nSBSA PL011 driver will access PL011 DMACR register in some functions.\nFor most real SBSA Pl011 hardware implementations, the DMACR write\nbehaviour will be ignored. So these DMACR operations will not cause\nobvious problems. But for some virtual SBSA PL011 hardware, like Xen\nvirtual SBSA PL011 (vpl011) device, the behaviour might be different.\nXen vpl011 emulation will inject a data abort to guest, when guest is\naccessing an unimplemented UART register. As Xen VPL011 is SBSA\ncompatible, it will not implement DMACR register. So when Linux SBSA\nPL011 driver access DMACR register, it will get an unhandled data abort\nfault and the application will get a segmentation fault:\nUnhandled fault at 0xffffffc00944d048\nMem abort info:\n ESR = 0x96000000\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x00: ttbr address size fault\nData abort info:\n ISV = 0, ISS = 0x00000000\n CM = 0, WnR = 0\nswapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000020e2e000\n[ffffffc00944d048] pgd=100000003ffff803, p4d=100000003ffff803, pud=100000003ffff803, pmd=100000003fffa803, pte=006800009c090f13\nInternal error: ttbr address size fault: 96000000 [#1] PREEMPT SMP\n...\nCall trace:\n pl011_stop_rx+0x70/0x80\n tty_port_shutdown+0x7c/0xb4\n tty_port_close+0x60/0xcc\n uart_close+0x34/0x8c\n tty_release+0x144/0x4c0\n __fput+0x78/0x220\n ____fput+0x1c/0x30\n task_work_run+0x88/0xc0\n do_notify_resume+0x8d0/0x123c\n el0_svc+0xa8/0xc0\n el0t_64_sync_handler+0xa4/0x130\n el0t_64_sync+0x1a0/0x1a4\nCode: b9000083 b901f001 794038a0 8b000042 (b9000041)\n---[ end trace 83dd93df15c3216f ]---\nnote: bootlogd[132] exited with preempt_count 1\n/etc/rcS.d/S07bootlogd: line 47: 132 Segmentation fault start-stop-daemon\n\nThis has been discussed in the Xen community, and we think it should fix\nthis in Linux. See [2] for more information.\n\n[1] https://developer.arm.com/documentation/den0094/c/?lang=en\n[2] https://lists.xenproject.org/archives/html/xen-devel/2022-11/msg00543.html",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50625",
"url": "https://www.suse.com/security/cve/CVE-2022-50625"
},
{
"category": "external",
"summary": "SUSE Bug 1254559 for CVE-2022-50625",
"url": "https://bugzilla.suse.com/1254559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2022-50625"
},
{
"cve": "CVE-2022-50630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50630"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: fix UAF in hugetlb_handle_userfault\n\nThe vma_lock and hugetlb_fault_mutex are dropped before handling userfault\nand reacquire them again after handle_userfault(), but reacquire the\nvma_lock could lead to UAF[1,2] due to the following race,\n\nhugetlb_fault\n hugetlb_no_page\n /*unlock vma_lock */\n hugetlb_handle_userfault\n handle_userfault\n /* unlock mm-\u003emmap_lock*/\n vm_mmap_pgoff\n do_mmap\n mmap_region\n munmap_vma_range\n /* clean old vma */\n /* lock vma_lock again \u003c--- UAF */\n /* unlock vma_lock */\n\nSince the vma_lock will unlock immediately after\nhugetlb_handle_userfault(), let\u0027s drop the unneeded lock and unlock in\nhugetlb_handle_userfault() to fix the issue.\n\n[1] https://lore.kernel.org/linux-mm/000000000000d5e00a05e834962e@google.com/\n[2] https://lore.kernel.org/linux-mm/20220921014457.1668-1-liuzixian4@huawei.com/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50630",
"url": "https://www.suse.com/security/cve/CVE-2022-50630"
},
{
"category": "external",
"summary": "SUSE Bug 1254785 for CVE-2022-50630",
"url": "https://bugzilla.suse.com/1254785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50630"
},
{
"cve": "CVE-2022-50636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50636"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Fix pci_device_is_present() for VFs by checking PF\n\npci_device_is_present() previously didn\u0027t work for VFs because it reads the\nVendor and Device ID, which are 0xffff for VFs, which looks like they\naren\u0027t present. Check the PF instead.\n\nWei Gong reported that if virtio I/O is in progress when the driver is\nunbound or \"0\" is written to /sys/.../sriov_numvfs, the virtio I/O\noperation hangs, which may result in output like this:\n\n task:bash state:D stack: 0 pid: 1773 ppid: 1241 flags:0x00004002\n Call Trace:\n schedule+0x4f/0xc0\n blk_mq_freeze_queue_wait+0x69/0xa0\n blk_mq_freeze_queue+0x1b/0x20\n blk_cleanup_queue+0x3d/0xd0\n virtblk_remove+0x3c/0xb0 [virtio_blk]\n virtio_dev_remove+0x4b/0x80\n ...\n device_unregister+0x1b/0x60\n unregister_virtio_device+0x18/0x30\n virtio_pci_remove+0x41/0x80\n pci_device_remove+0x3e/0xb0\n\nThis happened because pci_device_is_present(VF) returned \"false\" in\nvirtio_pci_remove(), so it called virtio_break_device(). The broken vq\nmeant that vring_interrupt() skipped the vq.callback() that would have\ncompleted the virtio I/O operation via virtblk_done().\n\n[bhelgaas: commit log, simplify to always use pci_physfn(), add stable tag]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50636",
"url": "https://www.suse.com/security/cve/CVE-2022-50636"
},
{
"category": "external",
"summary": "SUSE Bug 1254645 for CVE-2022-50636",
"url": "https://bugzilla.suse.com/1254645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50636"
},
{
"cve": "CVE-2022-50638",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50638"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug_on in __es_tree_search caused by bad boot loader inode\n\nWe got a issue as fllows:\n==================================================================\n kernel BUG at fs/ext4/extents_status.c:203!\n invalid opcode: 0000 [#1] PREEMPT SMP\n CPU: 1 PID: 945 Comm: cat Not tainted 6.0.0-next-20221007-dirty #349\n RIP: 0010:ext4_es_end.isra.0+0x34/0x42\n RSP: 0018:ffffc9000143b768 EFLAGS: 00010203\n RAX: 0000000000000000 RBX: ffff8881769cd0b8 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: ffffffff8fc27cf7 RDI: 00000000ffffffff\n RBP: ffff8881769cd0bc R08: 0000000000000000 R09: ffffc9000143b5f8\n R10: 0000000000000001 R11: 0000000000000001 R12: ffff8881769cd0a0\n R13: ffff8881768e5668 R14: 00000000768e52f0 R15: 0000000000000000\n FS: 00007f359f7f05c0(0000)GS:ffff88842fd00000(0000)knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f359f5a2000 CR3: 000000017130c000 CR4: 00000000000006e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \u003cTASK\u003e\n __es_tree_search.isra.0+0x6d/0xf5\n ext4_es_cache_extent+0xfa/0x230\n ext4_cache_extents+0xd2/0x110\n ext4_find_extent+0x5d5/0x8c0\n ext4_ext_map_blocks+0x9c/0x1d30\n ext4_map_blocks+0x431/0xa50\n ext4_mpage_readpages+0x48e/0xe40\n ext4_readahead+0x47/0x50\n read_pages+0x82/0x530\n page_cache_ra_unbounded+0x199/0x2a0\n do_page_cache_ra+0x47/0x70\n page_cache_ra_order+0x242/0x400\n ondemand_readahead+0x1e8/0x4b0\n page_cache_sync_ra+0xf4/0x110\n filemap_get_pages+0x131/0xb20\n filemap_read+0xda/0x4b0\n generic_file_read_iter+0x13a/0x250\n ext4_file_read_iter+0x59/0x1d0\n vfs_read+0x28f/0x460\n ksys_read+0x73/0x160\n __x64_sys_read+0x1e/0x30\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n \u003c/TASK\u003e\n==================================================================\n\nIn the above issue, ioctl invokes the swap_inode_boot_loader function to\nswap inode\u003c5\u003e and inode\u003c12\u003e. However, inode\u003c5\u003e contain incorrect imode and\ndisordered extents, and i_nlink is set to 1. The extents check for inode in\nthe ext4_iget function can be bypassed bacause 5 is EXT4_BOOT_LOADER_INO.\nWhile links_count is set to 1, the extents are not initialized in\nswap_inode_boot_loader. After the ioctl command is executed successfully,\nthe extents are swapped to inode\u003c12\u003e, in this case, run the `cat` command\nto view inode\u003c12\u003e. And Bug_ON is triggered due to the incorrect extents.\n\nWhen the boot loader inode is not initialized, its imode can be one of the\nfollowing:\n1) the imode is a bad type, which is marked as bad_inode in ext4_iget and\n set to S_IFREG.\n2) the imode is good type but not S_IFREG.\n3) the imode is S_IFREG.\n\nThe BUG_ON may be triggered by bypassing the check in cases 1 and 2.\nTherefore, when the boot loader inode is bad_inode or its imode is not\nS_IFREG, initialize the inode to avoid triggering the BUG.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50638",
"url": "https://www.suse.com/security/cve/CVE-2022-50638"
},
{
"category": "external",
"summary": "SUSE Bug 1255469 for CVE-2022-50638",
"url": "https://bugzilla.suse.com/1255469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50638"
},
{
"cve": "CVE-2022-50640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50640"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: core: Fix kernel panic when remove non-standard SDIO card\n\nSDIO tuple is only allocated for standard SDIO card, especially it causes\nmemory corruption issues when the non-standard SDIO card has removed, which\nis because the card device\u0027s reference counter does not increase for it at\nsdio_init_func(), but all SDIO card device reference counter gets decreased\nat sdio_release_func().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50640",
"url": "https://www.suse.com/security/cve/CVE-2022-50640"
},
{
"category": "external",
"summary": "SUSE Bug 1254686 for CVE-2022-50640",
"url": "https://bugzilla.suse.com/1254686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50640"
},
{
"cve": "CVE-2022-50643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50643"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix xid leak in cifs_copy_file_range()\n\nIf the file is used by swap, before return -EOPNOTSUPP, should\nfree the xid, otherwise, the xid will be leaked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50643",
"url": "https://www.suse.com/security/cve/CVE-2022-50643"
},
{
"category": "external",
"summary": "SUSE Bug 1254631 for CVE-2022-50643",
"url": "https://bugzilla.suse.com/1254631"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2022-50643"
},
{
"cve": "CVE-2022-50646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50646"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: hpsa: Fix possible memory leak in hpsa_init_one()\n\nThe hpda_alloc_ctlr_info() allocates h and its field reply_map. However, in\nhpsa_init_one(), if alloc_percpu() failed, the hpsa_init_one() jumps to\nclean1 directly, which frees h and leaks the h-\u003ereply_map.\n\nFix by calling hpda_free_ctlr_info() to release h-\u003ereplay_map and h instead\nfree h directly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50646",
"url": "https://www.suse.com/security/cve/CVE-2022-50646"
},
{
"category": "external",
"summary": "SUSE Bug 1254634 for CVE-2022-50646",
"url": "https://bugzilla.suse.com/1254634"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2022-50646"
},
{
"cve": "CVE-2022-50656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50656"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: pn533: Clear nfc_target before being used\n\nFix a slab-out-of-bounds read that occurs in nla_put() called from\nnfc_genl_send_target() when target-\u003esensb_res_len, which is duplicated\nfrom an nfc_target in pn533, is too large as the nfc_target is not\nproperly initialized and retains garbage values. Clear nfc_targets with\nmemset() before they are used.\n\nFound by a modified version of syzkaller.\n\nBUG: KASAN: slab-out-of-bounds in nla_put\nCall Trace:\n memcpy\n nla_put\n nfc_genl_dump_targets\n genl_lock_dumpit\n netlink_dump\n __netlink_dump_start\n genl_family_rcv_msg_dumpit\n genl_rcv_msg\n netlink_rcv_skb\n genl_rcv\n netlink_unicast\n netlink_sendmsg\n sock_sendmsg\n ____sys_sendmsg\n ___sys_sendmsg\n __sys_sendmsg\n do_syscall_64",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50656",
"url": "https://www.suse.com/security/cve/CVE-2022-50656"
},
{
"category": "external",
"summary": "SUSE Bug 1254745 for CVE-2022-50656",
"url": "https://bugzilla.suse.com/1254745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50656"
},
{
"cve": "CVE-2022-50668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50668"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix deadlock due to mbcache entry corruption\n\nWhen manipulating xattr blocks, we can deadlock infinitely looping\ninside ext4_xattr_block_set() where we constantly keep finding xattr\nblock for reuse in mbcache but we are unable to reuse it because its\nreference count is too big. This happens because cache entry for the\nxattr block is marked as reusable (e_reusable set) although its\nreference count is too big. When this inconsistency happens, this\ninconsistent state is kept indefinitely and so ext4_xattr_block_set()\nkeeps retrying indefinitely.\n\nThe inconsistent state is caused by non-atomic update of e_reusable bit.\ne_reusable is part of a bitfield and e_reusable update can race with\nupdate of e_referenced bit in the same bitfield resulting in loss of one\nof the updates. Fix the problem by using atomic bitops instead.\n\nThis bug has been around for many years, but it became *much* easier\nto hit after commit 65f8b80053a1 (\"ext4: fix race when reusing xattr\nblocks\").",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50668",
"url": "https://www.suse.com/security/cve/CVE-2022-50668"
},
{
"category": "external",
"summary": "SUSE Bug 1254763 for CVE-2022-50668",
"url": "https://bugzilla.suse.com/1254763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50668"
},
{
"cve": "CVE-2022-50677",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50677"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: fix use after free in _ipmi_destroy_user()\n\nThe intf_free() function frees the \"intf\" pointer so we cannot\ndereference it again on the next line.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50677",
"url": "https://www.suse.com/security/cve/CVE-2022-50677"
},
{
"category": "external",
"summary": "SUSE Bug 1254692 for CVE-2022-50677",
"url": "https://bugzilla.suse.com/1254692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50677"
},
{
"cve": "CVE-2022-50678",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50678"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix invalid address access when enabling SCAN log level\n\nThe variable i is changed when setting random MAC address and causes\ninvalid address access when printing the value of pi-\u003ereqs[i]-\u003ereqid.\n\nWe replace reqs index with ri to fix the issue.\n\n[ 136.726473] Unable to handle kernel access to user memory outside uaccess routines at virtual address 0000000000000000\n[ 136.737365] Mem abort info:\n[ 136.740172] ESR = 0x96000004\n[ 136.743359] Exception class = DABT (current EL), IL = 32 bits\n[ 136.749294] SET = 0, FnV = 0\n[ 136.752481] EA = 0, S1PTW = 0\n[ 136.755635] Data abort info:\n[ 136.758514] ISV = 0, ISS = 0x00000004\n[ 136.762487] CM = 0, WnR = 0\n[ 136.765522] user pgtable: 4k pages, 48-bit VAs, pgdp = 000000005c4e2577\n[ 136.772265] [0000000000000000] pgd=0000000000000000\n[ 136.777160] Internal error: Oops: 96000004 [#1] PREEMPT SMP\n[ 136.782732] Modules linked in: brcmfmac(O) brcmutil(O) cfg80211(O) compat(O)\n[ 136.789788] Process wificond (pid: 3175, stack limit = 0x00000000053048fb)\n[ 136.796664] CPU: 3 PID: 3175 Comm: wificond Tainted: G O 4.19.42-00001-g531a5f5 #1\n[ 136.805532] Hardware name: Freescale i.MX8MQ EVK (DT)\n[ 136.810584] pstate: 60400005 (nZCv daif +PAN -UAO)\n[ 136.815429] pc : brcmf_pno_config_sched_scans+0x6cc/0xa80 [brcmfmac]\n[ 136.821811] lr : brcmf_pno_config_sched_scans+0x67c/0xa80 [brcmfmac]\n[ 136.828162] sp : ffff00000e9a3880\n[ 136.831475] x29: ffff00000e9a3890 x28: ffff800020543400\n[ 136.836786] x27: ffff8000b1008880 x26: ffff0000012bf6a0\n[ 136.842098] x25: ffff80002054345c x24: ffff800088d22400\n[ 136.847409] x23: ffff0000012bf638 x22: ffff0000012bf6d8\n[ 136.852721] x21: ffff8000aced8fc0 x20: ffff8000ac164400\n[ 136.858032] x19: ffff00000e9a3946 x18: 0000000000000000\n[ 136.863343] x17: 0000000000000000 x16: 0000000000000000\n[ 136.868655] x15: ffff0000093f3b37 x14: 0000000000000050\n[ 136.873966] x13: 0000000000003135 x12: 0000000000000000\n[ 136.879277] x11: 0000000000000000 x10: ffff000009a61888\n[ 136.884589] x9 : 000000000000000f x8 : 0000000000000008\n[ 136.889900] x7 : 303a32303d726464 x6 : ffff00000a1f957d\n[ 136.895211] x5 : 0000000000000000 x4 : ffff00000e9a3942\n[ 136.900523] x3 : 0000000000000000 x2 : ffff0000012cead8\n[ 136.905834] x1 : ffff0000012bf6d8 x0 : 0000000000000000\n[ 136.911146] Call trace:\n[ 136.913623] brcmf_pno_config_sched_scans+0x6cc/0xa80 [brcmfmac]\n[ 136.919658] brcmf_pno_start_sched_scan+0xa4/0x118 [brcmfmac]\n[ 136.925430] brcmf_cfg80211_sched_scan_start+0x80/0xe0 [brcmfmac]\n[ 136.931636] nl80211_start_sched_scan+0x140/0x308 [cfg80211]\n[ 136.937298] genl_rcv_msg+0x358/0x3f4\n[ 136.940960] netlink_rcv_skb+0xb4/0x118\n[ 136.944795] genl_rcv+0x34/0x48\n[ 136.947935] netlink_unicast+0x264/0x300\n[ 136.951856] netlink_sendmsg+0x2e4/0x33c\n[ 136.955781] __sys_sendto+0x120/0x19c",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50678",
"url": "https://www.suse.com/security/cve/CVE-2022-50678"
},
{
"category": "external",
"summary": "SUSE Bug 1254902 for CVE-2022-50678",
"url": "https://bugzilla.suse.com/1254902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50678"
},
{
"cve": "CVE-2022-50700",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50700"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: Delay the unmapping of the buffer\n\nOn WCN3990, we are seeing a rare scenario where copy engine hardware is\nsending a copy complete interrupt to the host driver while still\nprocessing the buffer that the driver has sent, this is leading into an\nSMMU fault triggering kernel panic. This is happening on copy engine\nchannel 3 (CE3) where the driver normally enqueues WMI commands to the\nfirmware. Upon receiving a copy complete interrupt, host driver will\nimmediately unmap and frees the buffer presuming that hardware has\nprocessed the buffer. In the issue case, upon receiving copy complete\ninterrupt, host driver will unmap and free the buffer but since hardware\nis still accessing the buffer (which in this case got unmapped in\nparallel), SMMU hardware will trigger an SMMU fault resulting in a\nkernel panic.\n\nIn order to avoid this, as a work around, add a delay before unmapping\nthe copy engine source DMA buffer. This is conditionally done for\nWCN3990 and only for the CE3 channel where issue is seen.\n\nBelow is the crash signature:\n\nwifi smmu error: kernel: [ 10.120965] arm-smmu 15000000.iommu: Unhandled\ncontext fault: fsr=0x402, iova=0x7fdfd8ac0,\nfsynr=0x500003,cbfrsynra=0xc1, cb=6 arm-smmu 15000000.iommu: Unhandled\ncontext fault:fsr=0x402, iova=0x7fe06fdc0, fsynr=0x710003,\ncbfrsynra=0xc1, cb=6 qcom-q6v5-mss 4080000.remoteproc: fatal error\nreceived: err_qdi.c:1040:EF:wlan_process:0x1:WLAN RT:0x2091:\ncmnos_thread.c:3998:Asserted in copy_engine.c:AXI_ERROR_DETECTED:2149\nremoteproc remoteproc0: crash detected in\n4080000.remoteproc: type fatal error \u003c3\u003e remoteproc remoteproc0:\nhandling crash #1 in 4080000.remoteproc\n\npc : __arm_lpae_unmap+0x500/0x514\nlr : __arm_lpae_unmap+0x4bc/0x514\nsp : ffffffc011ffb530\nx29: ffffffc011ffb590 x28: 0000000000000000\nx27: 0000000000000000 x26: 0000000000000004\nx25: 0000000000000003 x24: ffffffc011ffb890\nx23: ffffffa762ef9be0 x22: ffffffa77244ef00\nx21: 0000000000000009 x20: 00000007fff7c000\nx19: 0000000000000003 x18: 0000000000000000\nx17: 0000000000000004 x16: ffffffd7a357d9f0\nx15: 0000000000000000 x14: 00fd5d4fa7ffffff\nx13: 000000000000000e x12: 0000000000000000\nx11: 00000000ffffffff x10: 00000000fffffe00\nx9 : 000000000000017c x8 : 000000000000000c\nx7 : 0000000000000000 x6 : ffffffa762ef9000\nx5 : 0000000000000003 x4 : 0000000000000004\nx3 : 0000000000001000 x2 : 00000007fff7c000\nx1 : ffffffc011ffb890 x0 : 0000000000000000 Call trace:\n__arm_lpae_unmap+0x500/0x514\n__arm_lpae_unmap+0x4bc/0x514\n__arm_lpae_unmap+0x4bc/0x514\narm_lpae_unmap_pages+0x78/0xa4\narm_smmu_unmap_pages+0x78/0x104\n__iommu_unmap+0xc8/0x1e4\niommu_unmap_fast+0x38/0x48\n__iommu_dma_unmap+0x84/0x104\niommu_dma_free+0x34/0x50\ndma_free_attrs+0xa4/0xd0\nath10k_htt_rx_free+0xc4/0xf4 [ath10k_core] ath10k_core_stop+0x64/0x7c\n[ath10k_core]\nath10k_halt+0x11c/0x180 [ath10k_core]\nath10k_stop+0x54/0x94 [ath10k_core]\ndrv_stop+0x48/0x1c8 [mac80211]\nieee80211_do_open+0x638/0x77c [mac80211] ieee80211_open+0x48/0x5c\n[mac80211]\n__dev_open+0xb4/0x174\n__dev_change_flags+0xc4/0x1dc\ndev_change_flags+0x3c/0x7c\ndevinet_ioctl+0x2b4/0x580\ninet_ioctl+0xb0/0x1b4\nsock_do_ioctl+0x4c/0x16c\ncompat_ifreq_ioctl+0x1cc/0x35c\ncompat_sock_ioctl+0x110/0x2ac\n__arm64_compat_sys_ioctl+0xf4/0x3e0\nel0_svc_common+0xb4/0x17c\nel0_svc_compat_handler+0x2c/0x58\nel0_svc_compat+0x8/0x2c\n\nTested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50700",
"url": "https://www.suse.com/security/cve/CVE-2022-50700"
},
{
"category": "external",
"summary": "SUSE Bug 1255576 for CVE-2022-50700",
"url": "https://bugzilla.suse.com/1255576"
},
{
"category": "external",
"summary": "SUSE Bug 1255577 for CVE-2022-50700",
"url": "https://bugzilla.suse.com/1255577"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "important"
}
],
"title": "CVE-2022-50700"
},
{
"cve": "CVE-2022-50706",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50706"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ieee802154: don\u0027t warn zero-sized raw_sendmsg()\n\nsyzbot is hitting skb_assert_len() warning at __dev_queue_xmit() [1],\nfor PF_IEEE802154 socket\u0027s zero-sized raw_sendmsg() request is hitting\n__dev_queue_xmit() with skb-\u003elen == 0.\n\nSince PF_IEEE802154 socket\u0027s zero-sized raw_sendmsg() request was\nable to return 0, don\u0027t call __dev_queue_xmit() if packet length is 0.\n\n ----------\n #include \u003csys/socket.h\u003e\n #include \u003cnetinet/in.h\u003e\n\n int main(int argc, char *argv[])\n {\n struct sockaddr_in addr = { .sin_family = AF_INET, .sin_addr.s_addr = htonl(INADDR_LOOPBACK) };\n struct iovec iov = { };\n struct msghdr hdr = { .msg_name = \u0026addr, .msg_namelen = sizeof(addr), .msg_iov = \u0026iov, .msg_iovlen = 1 };\n sendmsg(socket(PF_IEEE802154, SOCK_RAW, 0), \u0026hdr, 0);\n return 0;\n }\n ----------\n\nNote that this might be a sign that commit fd1894224407c484 (\"bpf: Don\u0027t\nredirect packets with invalid pkt_len\") should be reverted, for\nskb-\u003elen == 0 was acceptable for at least PF_IEEE802154 socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50706",
"url": "https://www.suse.com/security/cve/CVE-2022-50706"
},
{
"category": "external",
"summary": "SUSE Bug 1255581 for CVE-2022-50706",
"url": "https://bugzilla.suse.com/1255581"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50706"
},
{
"cve": "CVE-2022-50715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50715"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid1: stop mdx_raid1 thread when raid1 array run failed\n\nfail run raid1 array when we assemble array with the inactive disk only,\nbut the mdx_raid1 thread were not stop, Even if the associated resources\nhave been released. it will caused a NULL dereference when we do poweroff.\n\nThis causes the following Oops:\n [ 287.587787] BUG: kernel NULL pointer dereference, address: 0000000000000070\n [ 287.594762] #PF: supervisor read access in kernel mode\n [ 287.599912] #PF: error_code(0x0000) - not-present page\n [ 287.605061] PGD 0 P4D 0\n [ 287.607612] Oops: 0000 [#1] SMP NOPTI\n [ 287.611287] CPU: 3 PID: 5265 Comm: md0_raid1 Tainted: G U 5.10.146 #0\n [ 287.619029] Hardware name: xxxxxxx/To be filled by O.E.M, BIOS 5.19 06/16/2022\n [ 287.626775] RIP: 0010:md_check_recovery+0x57/0x500 [md_mod]\n [ 287.632357] Code: fe 01 00 00 48 83 bb 10 03 00 00 00 74 08 48 89 ......\n [ 287.651118] RSP: 0018:ffffc90000433d78 EFLAGS: 00010202\n [ 287.656347] RAX: 0000000000000000 RBX: ffff888105986800 RCX: 0000000000000000\n [ 287.663491] RDX: ffffc90000433bb0 RSI: 00000000ffffefff RDI: ffff888105986800\n [ 287.670634] RBP: ffffc90000433da0 R08: 0000000000000000 R09: c0000000ffffefff\n [ 287.677771] R10: 0000000000000001 R11: ffffc90000433ba8 R12: ffff888105986800\n [ 287.684907] R13: 0000000000000000 R14: fffffffffffffe00 R15: ffff888100b6b500\n [ 287.692052] FS: 0000000000000000(0000) GS:ffff888277f80000(0000) knlGS:0000000000000000\n [ 287.700149] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 287.705897] CR2: 0000000000000070 CR3: 000000000320a000 CR4: 0000000000350ee0\n [ 287.713033] Call Trace:\n [ 287.715498] raid1d+0x6c/0xbbb [raid1]\n [ 287.719256] ? __schedule+0x1ff/0x760\n [ 287.722930] ? schedule+0x3b/0xb0\n [ 287.726260] ? schedule_timeout+0x1ed/0x290\n [ 287.730456] ? __switch_to+0x11f/0x400\n [ 287.734219] md_thread+0xe9/0x140 [md_mod]\n [ 287.738328] ? md_thread+0xe9/0x140 [md_mod]\n [ 287.742601] ? wait_woken+0x80/0x80\n [ 287.746097] ? md_register_thread+0xe0/0xe0 [md_mod]\n [ 287.751064] kthread+0x11a/0x140\n [ 287.754300] ? kthread_park+0x90/0x90\n [ 287.757974] ret_from_fork+0x1f/0x30\n\nIn fact, when raid1 array run fail, we need to do\nmd_unregister_thread() before raid1_free().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50715",
"url": "https://www.suse.com/security/cve/CVE-2022-50715"
},
{
"category": "external",
"summary": "SUSE Bug 1255749 for CVE-2022-50715",
"url": "https://bugzilla.suse.com/1255749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50715"
},
{
"cve": "CVE-2022-50728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/lcs: Fix return type of lcs_start_xmit()\n\nWith clang\u0027s kernel control flow integrity (kCFI, CONFIG_CFI_CLANG),\nindirect call targets are validated against the expected function\npointer prototype to make sure the call target is valid to help mitigate\nROP attacks. If they are not identical, there is a failure at run time,\nwhich manifests as either a kernel panic or thread getting killed. A\nproposed warning in clang aims to catch these at compile time, which\nreveals:\n\n drivers/s390/net/lcs.c:2090:21: error: incompatible function pointer types initializing \u0027netdev_tx_t (*)(struct sk_buff *, struct net_device *)\u0027 (aka \u0027enum netdev_tx (*)(struct sk_buff *, struct net_device *)\u0027) with an expression of type \u0027int (struct sk_buff *, struct net_device *)\u0027 [-Werror,-Wincompatible-function-pointer-types-strict]\n .ndo_start_xmit = lcs_start_xmit,\n ^~~~~~~~~~~~~~\n drivers/s390/net/lcs.c:2097:21: error: incompatible function pointer types initializing \u0027netdev_tx_t (*)(struct sk_buff *, struct net_device *)\u0027 (aka \u0027enum netdev_tx (*)(struct sk_buff *, struct net_device *)\u0027) with an expression of type \u0027int (struct sk_buff *, struct net_device *)\u0027 [-Werror,-Wincompatible-function-pointer-types-strict]\n .ndo_start_xmit = lcs_start_xmit,\n ^~~~~~~~~~~~~~\n\n-\u003endo_start_xmit() in \u0027struct net_device_ops\u0027 expects a return type of\n\u0027netdev_tx_t\u0027, not \u0027int\u0027. Adjust the return type of lcs_start_xmit() to\nmatch the prototype\u0027s to resolve the warning and potential CFI failure,\nshould s390 select ARCH_SUPPORTS_CFI_CLANG in the future.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50728",
"url": "https://www.suse.com/security/cve/CVE-2022-50728"
},
{
"category": "external",
"summary": "SUSE Bug 1256046 for CVE-2022-50728",
"url": "https://bugzilla.suse.com/1256046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50728"
},
{
"cve": "CVE-2022-50730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50730"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: silence the warning when evicting inode with dioread_nolock\n\nWhen evicting an inode with default dioread_nolock, it could be raced by\nthe unwritten extents converting kworker after writeback some new\nallocated dirty blocks. It convert unwritten extents to written, the\nextents could be merged to upper level and free extent blocks, so it\ncould mark the inode dirty again even this inode has been marked\nI_FREEING. But the inode-\u003ei_io_list check and warning in\next4_evict_inode() missing this corner case. Fortunately,\next4_evict_inode() will wait all extents converting finished before this\ncheck, so it will not lead to inode use-after-free problem, every thing\nis OK besides this warning. The WARN_ON_ONCE was originally designed\nfor finding inode use-after-free issues in advance, but if we add\ncurrent dioread_nolock case in, it will become not quite useful, so fix\nthis warning by just remove this check.\n\n ======\n WARNING: CPU: 7 PID: 1092 at fs/ext4/inode.c:227\n ext4_evict_inode+0x875/0xc60\n ...\n RIP: 0010:ext4_evict_inode+0x875/0xc60\n ...\n Call Trace:\n \u003cTASK\u003e\n evict+0x11c/0x2b0\n iput+0x236/0x3a0\n do_unlinkat+0x1b4/0x490\n __x64_sys_unlinkat+0x4c/0xb0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n RIP: 0033:0x7fa933c1115b\n ======\n\nrm kworker\n ext4_end_io_end()\nvfs_unlink()\n ext4_unlink()\n ext4_convert_unwritten_io_end_vec()\n ext4_convert_unwritten_extents()\n ext4_map_blocks()\n ext4_ext_map_blocks()\n ext4_ext_try_to_merge_up()\n __mark_inode_dirty()\n check !I_FREEING\n locked_inode_to_wb_and_lock_list()\n iput()\n iput_final()\n evict()\n ext4_evict_inode()\n truncate_inode_pages_final() //wait release io_end\n inode_io_list_move_locked()\n ext4_release_io_end()\n trigger WARN_ON_ONCE()",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50730",
"url": "https://www.suse.com/security/cve/CVE-2022-50730"
},
{
"category": "external",
"summary": "SUSE Bug 1256048 for CVE-2022-50730",
"url": "https://bugzilla.suse.com/1256048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50730"
},
{
"cve": "CVE-2022-50733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50733"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: idmouse: fix an uninit-value in idmouse_open\n\nIn idmouse_create_image, if any ftip_command fails, it will\ngo to the reset label. However, this leads to the data in\nbulk_in_buffer[HEADER..IMGSIZE] uninitialized. And the check\nfor valid image incurs an uninitialized dereference.\n\nFix this by moving the check before reset label since this\ncheck only be valid if the data after bulk_in_buffer[HEADER]\nhas concrete data.\n\nNote that this is found by KMSAN, so only kernel compilation\nis tested.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50733",
"url": "https://www.suse.com/security/cve/CVE-2022-50733"
},
{
"category": "external",
"summary": "SUSE Bug 1256064 for CVE-2022-50733",
"url": "https://bugzilla.suse.com/1256064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50733"
},
{
"cve": "CVE-2022-50747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50747"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: Fix OOB Write in hfs_asc2mac\n\nSyzbot reported a OOB Write bug:\n\nloop0: detected capacity change from 0 to 64\n==================================================================\nBUG: KASAN: slab-out-of-bounds in hfs_asc2mac+0x467/0x9a0\nfs/hfs/trans.c:133\nWrite of size 1 at addr ffff88801848314e by task syz-executor391/3632\n\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106\n print_address_description+0x74/0x340 mm/kasan/report.c:284\n print_report+0x107/0x1f0 mm/kasan/report.c:395\n kasan_report+0xcd/0x100 mm/kasan/report.c:495\n hfs_asc2mac+0x467/0x9a0 fs/hfs/trans.c:133\n hfs_cat_build_key+0x92/0x170 fs/hfs/catalog.c:28\n hfs_lookup+0x1ab/0x2c0 fs/hfs/dir.c:31\n lookup_open fs/namei.c:3391 [inline]\n open_last_lookups fs/namei.c:3481 [inline]\n path_openat+0x10e6/0x2df0 fs/namei.c:3710\n do_filp_open+0x264/0x4f0 fs/namei.c:3740\n\nIf in-\u003elen is much larger than HFS_NAMELEN(31) which is the maximum\nlength of an HFS filename, a OOB write could occur in hfs_asc2mac(). In\nthat case, when the dst reaches the boundary, the srclen is still\ngreater than 0, which causes a OOB write.\nFix this by adding a check on dstlen in while() before writing to dst\naddress.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50747",
"url": "https://www.suse.com/security/cve/CVE-2022-50747"
},
{
"category": "external",
"summary": "SUSE Bug 1256432 for CVE-2022-50747",
"url": "https://bugzilla.suse.com/1256432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50747"
},
{
"cve": "CVE-2022-50755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50755"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Avoid double brelse() in udf_rename()\n\nsyzbot reported a warning like below [1]:\n\nVFS: brelse: Trying to free free buffer\nWARNING: CPU: 2 PID: 7301 at fs/buffer.c:1145 __brelse+0x67/0xa0\n...\nCall Trace:\n \u003cTASK\u003e\n invalidate_bh_lru+0x99/0x150\n smp_call_function_many_cond+0xe2a/0x10c0\n ? generic_remap_file_range_prep+0x50/0x50\n ? __brelse+0xa0/0xa0\n ? __mutex_lock+0x21c/0x12d0\n ? smp_call_on_cpu+0x250/0x250\n ? rcu_read_lock_sched_held+0xb/0x60\n ? lock_release+0x587/0x810\n ? __brelse+0xa0/0xa0\n ? generic_remap_file_range_prep+0x50/0x50\n on_each_cpu_cond_mask+0x3c/0x80\n blkdev_flush_mapping+0x13a/0x2f0\n blkdev_put_whole+0xd3/0xf0\n blkdev_put+0x222/0x760\n deactivate_locked_super+0x96/0x160\n deactivate_super+0xda/0x100\n cleanup_mnt+0x222/0x3d0\n task_work_run+0x149/0x240\n ? task_work_cancel+0x30/0x30\n do_exit+0xb29/0x2a40\n ? reacquire_held_locks+0x4a0/0x4a0\n ? do_raw_spin_lock+0x12a/0x2b0\n ? mm_update_next_owner+0x7c0/0x7c0\n ? rwlock_bug.part.0+0x90/0x90\n ? zap_other_threads+0x234/0x2d0\n do_group_exit+0xd0/0x2a0\n __x64_sys_exit_group+0x3a/0x50\n do_syscall_64+0x34/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe cause of the issue is that brelse() is called on both ofibh.sbh\nand ofibh.ebh by udf_find_entry() when it returns NULL. However,\nbrelse() is called by udf_rename(), too. So, b_count on buffer_head\nbecomes unbalanced.\n\nThis patch fixes the issue by not calling brelse() by udf_rename()\nwhen udf_find_entry() returns NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50755",
"url": "https://www.suse.com/security/cve/CVE-2022-50755"
},
{
"category": "external",
"summary": "SUSE Bug 1256199 for CVE-2022-50755",
"url": "https://bugzilla.suse.com/1256199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50755"
},
{
"cve": "CVE-2022-50761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50761"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/xen: Fix memory leak in xen_init_lock_cpu()\n\nIn xen_init_lock_cpu(), the @name has allocated new string by kasprintf(),\nif bind_ipi_to_irqhandler() fails, it should be freed, otherwise may lead\nto a memory leak issue, fix it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50761",
"url": "https://www.suse.com/security/cve/CVE-2022-50761"
},
{
"category": "external",
"summary": "SUSE Bug 1256062 for CVE-2022-50761",
"url": "https://bugzilla.suse.com/1256062"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50761"
},
{
"cve": "CVE-2022-50779",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50779"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\norangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string()\n\nWhen insert and remove the orangefs module, then debug_help_string will\nbe leaked:\n\n unreferenced object 0xffff8881652ba000 (size 4096):\n comm \"insmod\", pid 1701, jiffies 4294893639 (age 13218.530s)\n hex dump (first 32 bytes):\n 43 6c 69 65 6e 74 20 44 65 62 75 67 20 4b 65 79 Client Debug Key\n 77 6f 72 64 73 20 61 72 65 20 75 6e 6b 6e 6f 77 words are unknow\n backtrace:\n [\u003c0000000004e6f8e3\u003e] kmalloc_trace+0x27/0xa0\n [\u003c0000000006f75d85\u003e] orangefs_prepare_debugfs_help_string+0x5e/0x480 [orangefs]\n [\u003c0000000091270a2a\u003e] _sub_I_65535_1+0x57/0xf70 [crc_itu_t]\n [\u003c000000004b1ee1a3\u003e] do_one_initcall+0x87/0x2a0\n [\u003c000000001d0614ae\u003e] do_init_module+0xdf/0x320\n [\u003c00000000efef068c\u003e] load_module+0x2f98/0x3330\n [\u003c000000006533b44d\u003e] __do_sys_finit_module+0x113/0x1b0\n [\u003c00000000a0da6f99\u003e] do_syscall_64+0x35/0x80\n [\u003c000000007790b19b\u003e] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nWhen remove the module, should always free debug_help_string. Should\nalways free the allocated buffer when change the free_debug_help_string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50779",
"url": "https://www.suse.com/security/cve/CVE-2022-50779"
},
{
"category": "external",
"summary": "SUSE Bug 1256423 for CVE-2022-50779",
"url": "https://bugzilla.suse.com/1256423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50779"
},
{
"cve": "CVE-2022-50821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50821"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Don\u0027t leak netobj memory when gss_read_proxy_verf() fails",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50821",
"url": "https://www.suse.com/security/cve/CVE-2022-50821"
},
{
"category": "external",
"summary": "SUSE Bug 1256242 for CVE-2022-50821",
"url": "https://bugzilla.suse.com/1256242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50821"
},
{
"cve": "CVE-2022-50824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50824"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak\n\nIn check_acpi_tpm2(), we get the TPM2 table just to make\nsure the table is there, not used after the init, so the\nacpi_put_table() should be added to release the ACPI memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50824",
"url": "https://www.suse.com/security/cve/CVE-2022-50824"
},
{
"category": "external",
"summary": "SUSE Bug 1256334 for CVE-2022-50824",
"url": "https://bugzilla.suse.com/1256334"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50824"
},
{
"cve": "CVE-2022-50840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50840"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: snic: Fix possible UAF in snic_tgt_create()\n\nSmatch reports a warning as follows:\n\ndrivers/scsi/snic/snic_disc.c:307 snic_tgt_create() warn:\n \u0027\u0026tgt-\u003elist\u0027 not removed from list\n\nIf device_add() fails in snic_tgt_create(), tgt will be freed, but\ntgt-\u003elist will not be removed from snic-\u003edisc.tgt_list, then list traversal\nmay cause UAF.\n\nRemove from snic-\u003edisc.tgt_list before free().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50840",
"url": "https://www.suse.com/security/cve/CVE-2022-50840"
},
{
"category": "external",
"summary": "SUSE Bug 1256208 for CVE-2022-50840",
"url": "https://bugzilla.suse.com/1256208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50840"
},
{
"cve": "CVE-2022-50849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50849"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore: Avoid kcore oops by vmap()ing with VM_IOREMAP\n\nAn oops can be induced by running \u0027cat /proc/kcore \u003e /dev/null\u0027 on\ndevices using pstore with the ram backend because kmap_atomic() assumes\nlowmem pages are accessible with __va().\n\n Unable to handle kernel paging request at virtual address ffffff807ff2b000\n Mem abort info:\n ESR = 0x96000006\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x06: level 2 translation fault\n Data abort info:\n ISV = 0, ISS = 0x00000006\n CM = 0, WnR = 0\n swapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000081d87000\n [ffffff807ff2b000] pgd=180000017fe18003, p4d=180000017fe18003, pud=180000017fe18003, pmd=0000000000000000\n Internal error: Oops: 96000006 [#1] PREEMPT SMP\n Modules linked in: dm_integrity\n CPU: 7 PID: 21179 Comm: perf Not tainted 5.15.67-10882-ge4eb2eb988cd #1 baa443fb8e8477896a370b31a821eb2009f9bfba\n Hardware name: Google Lazor (rev3 - 8) (DT)\n pstate: a0400009 (NzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : __memcpy+0x110/0x260\n lr : vread+0x194/0x294\n sp : ffffffc013ee39d0\n x29: ffffffc013ee39f0 x28: 0000000000001000 x27: ffffff807ff2b000\n x26: 0000000000001000 x25: ffffffc0085a2000 x24: ffffff802d4b3000\n x23: ffffff80f8a60000 x22: ffffff802d4b3000 x21: ffffffc0085a2000\n x20: ffffff8080b7bc68 x19: 0000000000001000 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: ffffffd3073f2e60\n x14: ffffffffad588000 x13: 0000000000000000 x12: 0000000000000001\n x11: 00000000000001a2 x10: 00680000fff2bf0b x9 : 03fffffff807ff2b\n x8 : 0000000000000001 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffffff802d4b4000 x4 : ffffff807ff2c000 x3 : ffffffc013ee3a78\n x2 : 0000000000001000 x1 : ffffff807ff2b000 x0 : ffffff802d4b3000\n Call trace:\n __memcpy+0x110/0x260\n read_kcore+0x584/0x778\n proc_reg_read+0xb4/0xe4\n\nDuring early boot, memblock reserves the pages for the ramoops reserved\nmemory node in DT that would otherwise be part of the direct lowmem\nmapping. Pstore\u0027s ram backend reuses those reserved pages to change the\nmemory type (writeback or non-cached) by passing the pages to vmap()\n(see pfn_to_page() usage in persistent_ram_vmap() for more details) with\nspecific flags. When read_kcore() starts iterating over the vmalloc\nregion, it runs over the virtual address that vmap() returned for\nramoops. In aligned_vread() the virtual address is passed to\nvmalloc_to_page() which returns the page struct for the reserved lowmem\narea. That lowmem page is passed to kmap_atomic(), which effectively\ncalls page_to_virt() that assumes a lowmem page struct must be directly\naccessible with __va() and friends. These pages are mapped via vmap()\nthough, and the lowmem mapping was never made, so accessing them via the\nlowmem virtual address oopses like above.\n\nLet\u0027s side-step this problem by passing VM_IOREMAP to vmap(). This will\ntell vread() to not include the ramoops region in the kcore. Instead the\narea will look like a bunch of zeros. The alternative is to teach kmap()\nabout vmalloc areas that intersect with lowmem. Presumably such a change\nisn\u0027t a one-liner, and there isn\u0027t much interest in inspecting the\nramoops region in kcore files anyway, so the most expedient route is\ntaken for now.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50849",
"url": "https://www.suse.com/security/cve/CVE-2022-50849"
},
{
"category": "external",
"summary": "SUSE Bug 1256193 for CVE-2022-50849",
"url": "https://bugzilla.suse.com/1256193"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50849"
},
{
"cve": "CVE-2022-50850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50850"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ipr: Fix WARNING in ipr_init()\n\nipr_init() will not call unregister_reboot_notifier() when\npci_register_driver() fails, which causes a WARNING. Call\nunregister_reboot_notifier() when pci_register_driver() fails.\n\nnotifier callback ipr_halt [ipr] already registered\nWARNING: CPU: 3 PID: 299 at kernel/notifier.c:29\nnotifier_chain_register+0x16d/0x230\nModules linked in: ipr(+) xhci_pci_renesas xhci_hcd ehci_hcd usbcore\nled_class gpu_sched drm_buddy video wmi drm_ttm_helper ttm\ndrm_display_helper drm_kms_helper drm drm_panel_orientation_quirks\nagpgart cfbft\nCPU: 3 PID: 299 Comm: modprobe Tainted: G W\n6.1.0-rc1-00190-g39508d23b672-dirty #332\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nrel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014\nRIP: 0010:notifier_chain_register+0x16d/0x230\nCall Trace:\n \u003cTASK\u003e\n __blocking_notifier_chain_register+0x73/0xb0\n ipr_init+0x30/0x1000 [ipr]\n do_one_initcall+0xdb/0x480\n do_init_module+0x1cf/0x680\n load_module+0x6a50/0x70a0\n __do_sys_finit_module+0x12f/0x1c0\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50850",
"url": "https://www.suse.com/security/cve/CVE-2022-50850"
},
{
"category": "external",
"summary": "SUSE Bug 1256194 for CVE-2022-50850",
"url": "https://bugzilla.suse.com/1256194"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50850"
},
{
"cve": "CVE-2022-50859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message\n\nCommit d5c7076b772a (\"smb3: add smb3.1.1 to default dialect list\")\nextend the dialects from 3 to 4, but forget to decrease the extended\nlength when specific the dialect, then the message length is larger\nthan expected.\n\nThis maybe leak some info through network because not initialize the\nmessage body.\n\nAfter apply this patch, the VALIDATE_NEGOTIATE_INFO message length is\nreduced from 28 bytes to 26 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50859",
"url": "https://www.suse.com/security/cve/CVE-2022-50859"
},
{
"category": "external",
"summary": "SUSE Bug 1256172 for CVE-2022-50859",
"url": "https://bugzilla.suse.com/1256172"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50859"
},
{
"cve": "CVE-2022-50870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50870"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/rtas: avoid device tree lookups in rtas_os_term()\n\nrtas_os_term() is called during panic. Its behavior depends on a couple\nof conditions in the /rtas node of the device tree, the traversal of\nwhich entails locking and local IRQ state changes. If the kernel panics\nwhile devtree_lock is held, rtas_os_term() as currently written could\nhang.\n\nInstead of discovering the relevant characteristics at panic time,\ncache them in file-static variables at boot. Note the lookup for\n\"ibm,extended-os-term\" is converted to of_property_read_bool() since it\nis a boolean property, not an RTAS function token.\n\n[mpe: Incorporate suggested change from Nick]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50870",
"url": "https://www.suse.com/security/cve/CVE-2022-50870"
},
{
"category": "external",
"summary": "SUSE Bug 1256154 for CVE-2022-50870",
"url": "https://bugzilla.suse.com/1256154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50870"
},
{
"cve": "CVE-2022-50879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50879"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nobjtool: Fix SEGFAULT\n\nfind_insn() will return NULL in case of failure. Check insn in order\nto avoid a kernel Oops for NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50879",
"url": "https://www.suse.com/security/cve/CVE-2022-50879"
},
{
"category": "external",
"summary": "SUSE Bug 1256129 for CVE-2022-50879",
"url": "https://bugzilla.suse.com/1256129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-50879"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-23559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-23559"
}
],
"notes": [
{
"category": "general",
"text": "In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-23559",
"url": "https://www.suse.com/security/cve/CVE-2023-23559"
},
{
"category": "external",
"summary": "SUSE Bug 1207051 for CVE-2023-23559",
"url": "https://bugzilla.suse.com/1207051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-4132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4132"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano device is plugged in. This flaw allows a local user to crash the system, causing a denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4132",
"url": "https://www.suse.com/security/cve/CVE-2023-4132"
},
{
"category": "external",
"summary": "SUSE Bug 1213969 for CVE-2023-4132",
"url": "https://bugzilla.suse.com/1213969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-4132"
},
{
"cve": "CVE-2023-53020",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53020"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: close all race conditions in l2tp_tunnel_register()\n\nThe code in l2tp_tunnel_register() is racy in several ways:\n\n1. It modifies the tunnel socket _after_ publishing it.\n\n2. It calls setup_udp_tunnel_sock() on an existing socket without\n locking.\n\n3. It changes sock lock class on fly, which triggers many syzbot\n reports.\n\nThis patch amends all of them by moving socket initialization code\nbefore publishing and under sock lock. As suggested by Jakub, the\nl2tp lockdep class is not necessary as we can just switch to\nbh_lock_sock_nested().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53020",
"url": "https://www.suse.com/security/cve/CVE-2023-53020"
},
{
"category": "external",
"summary": "SUSE Bug 1240224 for CVE-2023-53020",
"url": "https://bugzilla.suse.com/1240224"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53020"
},
{
"cve": "CVE-2023-53176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: Reinit port-\u003epm on port specific driver unbind\n\nWhen we unbind a serial port hardware specific 8250 driver, the generic\nserial8250 driver takes over the port. After that we see an oops about 10\nseconds later. This can produce the following at least on some TI SoCs:\n\nUnhandled fault: imprecise external abort (0x1406)\nInternal error: : 1406 [#1] SMP ARM\n\nTurns out that we may still have the serial port hardware specific driver\nport-\u003epm in use, and serial8250_pm() tries to call it after the port\nspecific driver is gone:\n\nserial8250_pm [8250_base] from uart_change_pm+0x54/0x8c [serial_base]\nuart_change_pm [serial_base] from uart_hangup+0x154/0x198 [serial_base]\nuart_hangup [serial_base] from __tty_hangup.part.0+0x328/0x37c\n__tty_hangup.part.0 from disassociate_ctty+0x154/0x20c\ndisassociate_ctty from do_exit+0x744/0xaac\ndo_exit from do_group_exit+0x40/0x8c\ndo_group_exit from __wake_up_parent+0x0/0x1c\n\nLet\u0027s fix the issue by calling serial8250_set_defaults() in\nserial8250_unregister_port(). This will set the port back to using\nthe serial8250 default functions, and sets the port-\u003epm to point to\nserial8250_pm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53176",
"url": "https://www.suse.com/security/cve/CVE-2023-53176"
},
{
"category": "external",
"summary": "SUSE Bug 1249991 for CVE-2023-53176",
"url": "https://bugzilla.suse.com/1249991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53176"
},
{
"cve": "CVE-2023-53454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53454"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: multitouch: Correct devm device reference for hidinput input_dev name\n\nReference the HID device rather than the input device for the devm\nallocation of the input_dev name. Referencing the input_dev would lead to a\nuse-after-free when the input_dev was unregistered and subsequently fires a\nuevent that depends on the name. At the point of firing the uevent, the\nname would be freed by devres management.\n\nUse devm_kasprintf to simplify the logic for allocating memory and\nformatting the input_dev name string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53454",
"url": "https://www.suse.com/security/cve/CVE-2023-53454"
},
{
"category": "external",
"summary": "SUSE Bug 1250759 for CVE-2023-53454",
"url": "https://bugzilla.suse.com/1250759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53454"
},
{
"cve": "CVE-2023-53718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53718"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Do not swap cpu_buffer during resize process\n\nWhen ring_buffer_swap_cpu was called during resize process,\nthe cpu buffer was swapped in the middle, resulting in incorrect state.\nContinuing to run in the wrong state will result in oops.\n\nThis issue can be easily reproduced using the following two scripts:\n/tmp # cat test1.sh\n//#! /bin/sh\nfor i in `seq 0 100000`\ndo\n echo 2000 \u003e /sys/kernel/debug/tracing/buffer_size_kb\n sleep 0.5\n echo 5000 \u003e /sys/kernel/debug/tracing/buffer_size_kb\n sleep 0.5\ndone\n/tmp # cat test2.sh\n//#! /bin/sh\nfor i in `seq 0 100000`\ndo\n echo irqsoff \u003e /sys/kernel/debug/tracing/current_tracer\n sleep 1\n echo nop \u003e /sys/kernel/debug/tracing/current_tracer\n sleep 1\ndone\n/tmp # ./test1.sh \u0026\n/tmp # ./test2.sh \u0026\n\nA typical oops log is as follows, sometimes with other different oops logs.\n\n[ 231.711293] WARNING: CPU: 0 PID: 9 at kernel/trace/ring_buffer.c:2026 rb_update_pages+0x378/0x3f8\n[ 231.713375] Modules linked in:\n[ 231.714735] CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G W 6.5.0-rc1-00276-g20edcec23f92 #15\n[ 231.716750] Hardware name: linux,dummy-virt (DT)\n[ 231.718152] Workqueue: events update_pages_handler\n[ 231.719714] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 231.721171] pc : rb_update_pages+0x378/0x3f8\n[ 231.722212] lr : rb_update_pages+0x25c/0x3f8\n[ 231.723248] sp : ffff800082b9bd50\n[ 231.724169] x29: ffff800082b9bd50 x28: ffff8000825f7000 x27: 0000000000000000\n[ 231.726102] x26: 0000000000000001 x25: fffffffffffff010 x24: 0000000000000ff0\n[ 231.728122] x23: ffff0000c3a0b600 x22: ffff0000c3a0b5c0 x21: fffffffffffffe0a\n[ 231.730203] x20: ffff0000c3a0b600 x19: ffff0000c0102400 x18: 0000000000000000\n[ 231.732329] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffe7aa8510\n[ 231.734212] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000002\n[ 231.736291] x11: ffff8000826998a8 x10: ffff800082b9baf0 x9 : ffff800081137558\n[ 231.738195] x8 : fffffc00030e82c8 x7 : 0000000000000000 x6 : 0000000000000001\n[ 231.740192] x5 : ffff0000ffbafe00 x4 : 0000000000000000 x3 : 0000000000000000\n[ 231.742118] x2 : 00000000000006aa x1 : 0000000000000001 x0 : ffff0000c0007208\n[ 231.744196] Call trace:\n[ 231.744892] rb_update_pages+0x378/0x3f8\n[ 231.745893] update_pages_handler+0x1c/0x38\n[ 231.746893] process_one_work+0x1f0/0x468\n[ 231.747852] worker_thread+0x54/0x410\n[ 231.748737] kthread+0x124/0x138\n[ 231.749549] ret_from_fork+0x10/0x20\n[ 231.750434] ---[ end trace 0000000000000000 ]---\n[ 233.720486] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[ 233.721696] Mem abort info:\n[ 233.721935] ESR = 0x0000000096000004\n[ 233.722283] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 233.722596] SET = 0, FnV = 0\n[ 233.722805] EA = 0, S1PTW = 0\n[ 233.723026] FSC = 0x04: level 0 translation fault\n[ 233.723458] Data abort info:\n[ 233.723734] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n[ 233.724176] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[ 233.724589] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[ 233.725075] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000104943000\n[ 233.725592] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[ 233.726231] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP\n[ 233.726720] Modules linked in:\n[ 233.727007] CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G W 6.5.0-rc1-00276-g20edcec23f92 #15\n[ 233.727777] Hardware name: linux,dummy-virt (DT)\n[ 233.728225] Workqueue: events update_pages_handler\n[ 233.728655] pstate: 200000c5 (nzCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 233.729054] pc : rb_update_pages+0x1a8/0x3f8\n[ 233.729334] lr : rb_update_pages+0x154/0x3f8\n[ 233.729592] sp : ffff800082b9bd50\n[ 233.729792] x29: ffff800082b9bd50 x28: ffff8000825f7000 x27: 00000000\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53718",
"url": "https://www.suse.com/security/cve/CVE-2023-53718"
},
{
"category": "external",
"summary": "SUSE Bug 1252564 for CVE-2023-53718",
"url": "https://bugzilla.suse.com/1252564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53718"
},
{
"cve": "CVE-2023-53746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53746"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/vfio-ap: fix memory leak in vfio_ap device driver\n\nThe device release callback function invoked to release the matrix device\nuses the dev_get_drvdata(device *dev) function to retrieve the\npointer to the vfio_matrix_dev object in order to free its storage. The\nproblem is, this object is not stored as drvdata with the device; since the\nkfree function will accept a NULL pointer, the memory for the\nvfio_matrix_dev object is never freed.\n\nSince the device being released is contained within the vfio_matrix_dev\nobject, the container_of macro will be used to retrieve its pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53746",
"url": "https://www.suse.com/security/cve/CVE-2023-53746"
},
{
"category": "external",
"summary": "SUSE Bug 1254617 for CVE-2023-53746",
"url": "https://bugzilla.suse.com/1254617"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53746"
},
{
"cve": "CVE-2023-53748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53748"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mediatek: vcodec: Fix potential array out-of-bounds in decoder queue_setup\n\nvariable *nplanes is provided by user via system call argument. The\npossible value of q_data-\u003efmt-\u003enum_planes is 1-3, while the value\nof *nplanes can be 1-8. The array access by index i can cause array\nout-of-bounds.\n\nFix this bug by checking *nplanes against the array size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53748",
"url": "https://www.suse.com/security/cve/CVE-2023-53748"
},
{
"category": "external",
"summary": "SUSE Bug 1254907 for CVE-2023-53748",
"url": "https://bugzilla.suse.com/1254907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53748"
},
{
"cve": "CVE-2023-53754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53754"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup()\n\nWhen if_type equals zero and pci_resource_start(pdev, PCI_64BIT_BAR4)\nreturns false, drbl_regs_memmap_p is not remapped. This passes a NULL\npointer to iounmap(), which can trigger a WARN() on certain arches.\n\nWhen if_type equals six and pci_resource_start(pdev, PCI_64BIT_BAR4)\nreturns true, drbl_regs_memmap_p may has been remapped and\nctrl_regs_memmap_p is not remapped. This is a resource leak and passes a\nNULL pointer to iounmap().\n\nTo fix these issues, we need to add null checks before iounmap(), and\nchange some goto labels.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53754",
"url": "https://www.suse.com/security/cve/CVE-2023-53754"
},
{
"category": "external",
"summary": "SUSE Bug 1254609 for CVE-2023-53754",
"url": "https://bugzilla.suse.com/1254609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53754"
},
{
"cve": "CVE-2023-53765",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53765"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm cache: free background tracker\u0027s queued work in btracker_destroy\n\nOtherwise the kernel can BUG with:\n\n[ 2245.426978] =============================================================================\n[ 2245.435155] BUG bt_work (Tainted: G B W ): Objects remaining in bt_work on __kmem_cache_shutdown()\n[ 2245.445233] -----------------------------------------------------------------------------\n[ 2245.445233]\n[ 2245.454879] Slab 0x00000000b0ce2b30 objects=64 used=2 fp=0x000000000a3c6a4e flags=0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff)\n[ 2245.467300] CPU: 7 PID: 10805 Comm: lvm Kdump: loaded Tainted: G B W 6.0.0-rc2 #19\n[ 2245.476078] Hardware name: Dell Inc. PowerEdge R7525/0590KW, BIOS 2.5.6 10/06/2021\n[ 2245.483646] Call Trace:\n[ 2245.486100] \u003cTASK\u003e\n[ 2245.488206] dump_stack_lvl+0x34/0x48\n[ 2245.491878] slab_err+0x95/0xcd\n[ 2245.495028] __kmem_cache_shutdown.cold+0x31/0x136\n[ 2245.499821] kmem_cache_destroy+0x49/0x130\n[ 2245.503928] btracker_destroy+0x12/0x20 [dm_cache]\n[ 2245.508728] smq_destroy+0x15/0x60 [dm_cache_smq]\n[ 2245.513435] dm_cache_policy_destroy+0x12/0x20 [dm_cache]\n[ 2245.518834] destroy+0xc0/0x110 [dm_cache]\n[ 2245.522933] dm_table_destroy+0x5c/0x120 [dm_mod]\n[ 2245.527649] __dm_destroy+0x10e/0x1c0 [dm_mod]\n[ 2245.532102] dev_remove+0x117/0x190 [dm_mod]\n[ 2245.536384] ctl_ioctl+0x1a2/0x290 [dm_mod]\n[ 2245.540579] dm_ctl_ioctl+0xa/0x20 [dm_mod]\n[ 2245.544773] __x64_sys_ioctl+0x8a/0xc0\n[ 2245.548524] do_syscall_64+0x5c/0x90\n[ 2245.552104] ? syscall_exit_to_user_mode+0x12/0x30\n[ 2245.556897] ? do_syscall_64+0x69/0x90\n[ 2245.560648] ? do_syscall_64+0x69/0x90\n[ 2245.564394] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 2245.569447] RIP: 0033:0x7fe52583ec6b\n...\n[ 2245.646771] ------------[ cut here ]------------\n[ 2245.651395] kmem_cache_destroy bt_work: Slab cache still has objects when called from btracker_destroy+0x12/0x20 [dm_cache]\n[ 2245.651408] WARNING: CPU: 7 PID: 10805 at mm/slab_common.c:478 kmem_cache_destroy+0x128/0x130\n\nFound using: lvm2-testsuite --only \"cache-single-split.sh\"\n\nBen bisected and found that commit 0495e337b703 (\"mm/slab_common:\nDeleting kobject in kmem_cache_destroy() without holding\nslab_mutex/cpu_hotplug_lock\") first exposed dm-cache\u0027s incomplete\ncleanup of its background tracker work objects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53765",
"url": "https://www.suse.com/security/cve/CVE-2023-53765"
},
{
"category": "external",
"summary": "SUSE Bug 1254912 for CVE-2023-53765",
"url": "https://bugzilla.suse.com/1254912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53765"
},
{
"cve": "CVE-2023-53781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53781"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in tcp_write_timer_handler().\n\nWith Eric\u0027s ref tracker, syzbot finally found a repro for\nuse-after-free in tcp_write_timer_handler() by kernel TCP\nsockets. [0]\n\nIf SMC creates a kernel socket in __smc_create(), the kernel\nsocket is supposed to be freed in smc_clcsock_release() by\ncalling sock_release() when we close() the parent SMC socket.\n\nHowever, at the end of smc_clcsock_release(), the kernel\nsocket\u0027s sk_state might not be TCP_CLOSE. This means that\nwe have not called inet_csk_destroy_sock() in __tcp_close()\nand have not stopped the TCP timers.\n\nThe kernel socket\u0027s TCP timers can be fired later, so we\nneed to hold a refcnt for net as we do for MPTCP subflows\nin mptcp_subflow_create_socket().\n\n[0]:\nleaked reference.\n sk_alloc (./include/net/net_namespace.h:335 net/core/sock.c:2108)\n inet_create (net/ipv4/af_inet.c:319 net/ipv4/af_inet.c:244)\n __sock_create (net/socket.c:1546)\n smc_create (net/smc/af_smc.c:3269 net/smc/af_smc.c:3284)\n __sock_create (net/socket.c:1546)\n __sys_socket (net/socket.c:1634 net/socket.c:1618 net/socket.c:1661)\n __x64_sys_socket (net/socket.c:1672)\n do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)\n entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)\n==================================================================\nBUG: KASAN: slab-use-after-free in tcp_write_timer_handler (net/ipv4/tcp_timer.c:378 net/ipv4/tcp_timer.c:624 net/ipv4/tcp_timer.c:594)\nRead of size 1 at addr ffff888052b65e0d by task syzrepro/18091\n\nCPU: 0 PID: 18091 Comm: syzrepro Tainted: G W 6.3.0-rc4-01174-gb5d54eb5899a #7\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-1.amzn2022.0.1 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl (lib/dump_stack.c:107)\n print_report (mm/kasan/report.c:320 mm/kasan/report.c:430)\n kasan_report (mm/kasan/report.c:538)\n tcp_write_timer_handler (net/ipv4/tcp_timer.c:378 net/ipv4/tcp_timer.c:624 net/ipv4/tcp_timer.c:594)\n tcp_write_timer (./include/linux/spinlock.h:390 net/ipv4/tcp_timer.c:643)\n call_timer_fn (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/timer.h:127 kernel/time/timer.c:1701)\n __run_timers.part.0 (kernel/time/timer.c:1752 kernel/time/timer.c:2022)\n run_timer_softirq (kernel/time/timer.c:2037)\n __do_softirq (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/irq.h:142 kernel/softirq.c:572)\n __irq_exit_rcu (kernel/softirq.c:445 kernel/softirq.c:650)\n irq_exit_rcu (kernel/softirq.c:664)\n sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1107 (discriminator 14))\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53781",
"url": "https://www.suse.com/security/cve/CVE-2023-53781"
},
{
"category": "external",
"summary": "SUSE Bug 1254751 for CVE-2023-53781",
"url": "https://bugzilla.suse.com/1254751"
},
{
"category": "external",
"summary": "SUSE Bug 1254755 for CVE-2023-53781",
"url": "https://bugzilla.suse.com/1254755"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "important"
}
],
"title": "CVE-2023-53781"
},
{
"cve": "CVE-2023-53786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53786"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm flakey: fix a crash with invalid table line\n\nThis command will crash with NULL pointer dereference:\n dmsetup create flakey --table \\\n \"0 `blockdev --getsize /dev/ram0` flakey /dev/ram0 0 0 1 2 corrupt_bio_byte 512\"\n\nFix the crash by checking if arg_name is non-NULL before comparing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53786",
"url": "https://www.suse.com/security/cve/CVE-2023-53786"
},
{
"category": "external",
"summary": "SUSE Bug 1254916 for CVE-2023-53786",
"url": "https://bugzilla.suse.com/1254916"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53786"
},
{
"cve": "CVE-2023-53788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set()\n\ntuning_ctl_set() might have buffer overrun at (X) if it didn\u0027t break\nfrom loop by matching (A).\n\n\tstatic int tuning_ctl_set(...)\n\t{\n\t\tfor (i = 0; i \u003c TUNING_CTLS_COUNT; i++)\n(A)\t\t\tif (nid == ca0132_tuning_ctls[i].nid)\n\t\t\t\tbreak;\n\n\t\tsnd_hda_power_up(...);\n(X)\t\tdspio_set_param(..., ca0132_tuning_ctls[i].mid, ...);\n\t\tsnd_hda_power_down(...); ^\n\n\t\treturn 1;\n\t}\n\nWe will get below error by cppcheck\n\n\tsound/pci/hda/patch_ca0132.c:4229:2: note: After for loop, i has value 12\n\t for (i = 0; i \u003c TUNING_CTLS_COUNT; i++)\n\t ^\n\tsound/pci/hda/patch_ca0132.c:4234:43: note: Array index out of bounds\n\t dspio_set_param(codec, ca0132_tuning_ctls[i].mid, 0x20,\n\t ^\nThis patch cares non match case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53788",
"url": "https://www.suse.com/security/cve/CVE-2023-53788"
},
{
"category": "external",
"summary": "SUSE Bug 1254917 for CVE-2023-53788",
"url": "https://bugzilla.suse.com/1254917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53788"
},
{
"cve": "CVE-2023-53803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53803"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process()\n\nA fix for:\n\nBUG: KASAN: slab-out-of-bounds in ses_enclosure_data_process+0x949/0xe30 [ses]\nRead of size 1 at addr ffff88a1b043a451 by task systemd-udevd/3271\n\nChecking after (and before in next loop) addl_desc_ptr[1] is sufficient, we\nexpect the size to be sanitized before first access to addl_desc_ptr[1].\nMake sure we don\u0027t walk beyond end of page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53803",
"url": "https://www.suse.com/security/cve/CVE-2023-53803"
},
{
"category": "external",
"summary": "SUSE Bug 1255165 for CVE-2023-53803",
"url": "https://bugzilla.suse.com/1255165"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53803"
},
{
"cve": "CVE-2023-53809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53809"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: Avoid possible recursive deadlock in l2tp_tunnel_register()\n\nWhen a file descriptor of pppol2tp socket is passed as file descriptor\nof UDP socket, a recursive deadlock occurs in l2tp_tunnel_register().\nThis situation is reproduced by the following program:\n\nint main(void)\n{\n\tint sock;\n\tstruct sockaddr_pppol2tp addr;\n\n\tsock = socket(AF_PPPOX, SOCK_DGRAM, PX_PROTO_OL2TP);\n\tif (sock \u003c 0) {\n\t\tperror(\"socket\");\n\t\treturn 1;\n\t}\n\n\taddr.sa_family = AF_PPPOX;\n\taddr.sa_protocol = PX_PROTO_OL2TP;\n\taddr.pppol2tp.pid = 0;\n\taddr.pppol2tp.fd = sock;\n\taddr.pppol2tp.addr.sin_family = PF_INET;\n\taddr.pppol2tp.addr.sin_port = htons(0);\n\taddr.pppol2tp.addr.sin_addr.s_addr = inet_addr(\"192.168.0.1\");\n\taddr.pppol2tp.s_tunnel = 1;\n\taddr.pppol2tp.s_session = 0;\n\taddr.pppol2tp.d_tunnel = 0;\n\taddr.pppol2tp.d_session = 0;\n\n\tif (connect(sock, (const struct sockaddr *)\u0026addr, sizeof(addr)) \u003c 0) {\n\t\tperror(\"connect\");\n\t\treturn 1;\n\t}\n\n\treturn 0;\n}\n\nThis program causes the following lockdep warning:\n\n ============================================\n WARNING: possible recursive locking detected\n 6.2.0-rc5-00205-gc96618275234 #56 Not tainted\n --------------------------------------------\n repro/8607 is trying to acquire lock:\n ffff8880213c8130 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: l2tp_tunnel_register+0x2b7/0x11c0\n\n but task is already holding lock:\n ffff8880213c8130 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: pppol2tp_connect+0xa82/0x1a30\n\n other info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(sk_lock-AF_PPPOX);\n lock(sk_lock-AF_PPPOX);\n\n *** DEADLOCK ***\n\n May be due to missing lock nesting notation\n\n 1 lock held by repro/8607:\n #0: ffff8880213c8130 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: pppol2tp_connect+0xa82/0x1a30\n\n stack backtrace:\n CPU: 0 PID: 8607 Comm: repro Not tainted 6.2.0-rc5-00205-gc96618275234 #56\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x100/0x178\n __lock_acquire.cold+0x119/0x3b9\n ? lockdep_hardirqs_on_prepare+0x410/0x410\n lock_acquire+0x1e0/0x610\n ? l2tp_tunnel_register+0x2b7/0x11c0\n ? lock_downgrade+0x710/0x710\n ? __fget_files+0x283/0x3e0\n lock_sock_nested+0x3a/0xf0\n ? l2tp_tunnel_register+0x2b7/0x11c0\n l2tp_tunnel_register+0x2b7/0x11c0\n ? sprintf+0xc4/0x100\n ? l2tp_tunnel_del_work+0x6b0/0x6b0\n ? debug_object_deactivate+0x320/0x320\n ? lockdep_init_map_type+0x16d/0x7a0\n ? lockdep_init_map_type+0x16d/0x7a0\n ? l2tp_tunnel_create+0x2bf/0x4b0\n ? l2tp_tunnel_create+0x3c6/0x4b0\n pppol2tp_connect+0x14e1/0x1a30\n ? pppol2tp_put_sk+0xd0/0xd0\n ? aa_sk_perm+0x2b7/0xa80\n ? aa_af_perm+0x260/0x260\n ? bpf_lsm_socket_connect+0x9/0x10\n ? pppol2tp_put_sk+0xd0/0xd0\n __sys_connect_file+0x14f/0x190\n __sys_connect+0x133/0x160\n ? __sys_connect_file+0x190/0x190\n ? lockdep_hardirqs_on+0x7d/0x100\n ? ktime_get_coarse_real_ts64+0x1b7/0x200\n ? ktime_get_coarse_real_ts64+0x147/0x200\n ? __audit_syscall_entry+0x396/0x500\n __x64_sys_connect+0x72/0xb0\n do_syscall_64+0x38/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThis patch fixes the issue by getting/creating the tunnel before\nlocking the pppol2tp socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53809",
"url": "https://www.suse.com/security/cve/CVE-2023-53809"
},
{
"category": "external",
"summary": "SUSE Bug 1254722 for CVE-2023-53809",
"url": "https://bugzilla.suse.com/1254722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53809"
},
{
"cve": "CVE-2023-53819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\namdgpu: validate offset_in_bo of drm_amdgpu_gem_va\n\nThis is motivated by OOB access in amdgpu_vm_update_range when\noffset_in_bo+map_size overflows.\n\nv2: keep the validations in amdgpu_vm_bo_map\nv3: add the validations to amdgpu_vm_bo_map/amdgpu_vm_bo_replace_map\n rather than to amdgpu_gem_va_ioctl",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53819",
"url": "https://www.suse.com/security/cve/CVE-2023-53819"
},
{
"category": "external",
"summary": "SUSE Bug 1254712 for CVE-2023-53819",
"url": "https://bugzilla.suse.com/1254712"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53819"
},
{
"cve": "CVE-2023-53832",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53832"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid10: fix null-ptr-deref in raid10_sync_request\n\ninit_resync() inits mempool and sets conf-\u003ehave_replacemnt at the beginning\nof sync, close_sync() frees the mempool when sync is completed.\n\nAfter [1] recovery might be skipped and init_resync() is called but\nclose_sync() is not. null-ptr-deref occurs with r10bio-\u003edev[i].repl_bio.\n\nThe following is one way to reproduce the issue.\n\n 1) create a array, wait for resync to complete, mddev-\u003erecovery_cp is set\n to MaxSector.\n 2) recovery is woken and it is skipped. conf-\u003ehave_replacement is set to\n 0 in init_resync(). close_sync() not called.\n 3) some io errors and rdev A is set to WantReplacement.\n 4) a new device is added and set to A\u0027s replacement.\n 5) recovery is woken, A have replacement, but conf-\u003ehave_replacemnt is\n 0. r10bio-\u003edev[i].repl_bio will not be alloced and null-ptr-deref\n occurs.\n\nFix it by not calling init_resync() if recovery skipped.\n\n[1] commit 7e83ccbecd60 (\"md/raid10: Allow skipping recovery when clean arrays are assembled\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53832",
"url": "https://www.suse.com/security/cve/CVE-2023-53832"
},
{
"category": "external",
"summary": "SUSE Bug 1254671 for CVE-2023-53832",
"url": "https://bugzilla.suse.com/1254671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53832"
},
{
"cve": "CVE-2023-53840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53840"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: early: xhci-dbc: Fix a potential out-of-bound memory access\n\nIf xdbc_bulk_write() fails, the values in \u0027buf\u0027 can be anything. So the\nstring is not guaranteed to be NULL terminated when xdbc_trace() is called.\n\nReserve an extra byte, which will be zeroed automatically because \u0027buf\u0027 is\na static variable, in order to avoid troubles, should it happen.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53840",
"url": "https://www.suse.com/security/cve/CVE-2023-53840"
},
{
"category": "external",
"summary": "SUSE Bug 1254709 for CVE-2023-53840",
"url": "https://bugzilla.suse.com/1254709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53840"
},
{
"cve": "CVE-2023-53847",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53847"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb-storage: alauda: Fix uninit-value in alauda_check_media()\n\nSyzbot got KMSAN to complain about access to an uninitialized value in\nthe alauda subdriver of usb-storage:\n\nBUG: KMSAN: uninit-value in alauda_transport+0x462/0x57f0\ndrivers/usb/storage/alauda.c:1137\nCPU: 0 PID: 12279 Comm: usb-storage Not tainted 5.3.0-rc7+ #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS\nGoogle 01/01/2011\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x191/0x1f0 lib/dump_stack.c:113\n kmsan_report+0x13a/0x2b0 mm/kmsan/kmsan_report.c:108\n __msan_warning+0x73/0xe0 mm/kmsan/kmsan_instr.c:250\n alauda_check_media+0x344/0x3310 drivers/usb/storage/alauda.c:460\n\nThe problem is that alauda_check_media() doesn\u0027t verify that its USB\ntransfer succeeded before trying to use the received data. What\nshould happen if the transfer fails isn\u0027t entirely clear, but a\nreasonably conservative approach is to pretend that no media is\npresent.\n\nA similar problem exists in a usb_stor_dbg() call in\nalauda_get_media_status(). In this case, when an error occurs the\ncall is redundant, because usb_stor_ctrl_transfer() already will print\na debugging message.\n\nFinally, unrelated to the uninitialized memory access, is the fact\nthat alauda_check_media() performs DMA to a buffer on the stack.\nFortunately usb-storage provides a general purpose DMA-able buffer for\nuses like this. We\u0027ll use it instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53847",
"url": "https://www.suse.com/security/cve/CVE-2023-53847"
},
{
"category": "external",
"summary": "SUSE Bug 1254698 for CVE-2023-53847",
"url": "https://bugzilla.suse.com/1254698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53847"
},
{
"cve": "CVE-2023-53850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53850"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: use internal state to free traffic IRQs\n\nIf the system tries to close the netdev while iavf_reset_task() is\nrunning, __LINK_STATE_START will be cleared and netif_running() will\nreturn false in iavf_reinit_interrupt_scheme(). This will result in\niavf_free_traffic_irqs() not being called and a leak as follows:\n\n [7632.489326] remove_proc_entry: removing non-empty directory \u0027irq/999\u0027, leaking at least \u0027iavf-enp24s0f0v0-TxRx-0\u0027\n [7632.490214] WARNING: CPU: 0 PID: 10 at fs/proc/generic.c:718 remove_proc_entry+0x19b/0x1b0\n\nis shown when pci_disable_msix() is later called. Fix by using the\ninternal adapter state. The traffic IRQs will always exist if\nstate == __IAVF_RUNNING.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53850",
"url": "https://www.suse.com/security/cve/CVE-2023-53850"
},
{
"category": "external",
"summary": "SUSE Bug 1254677 for CVE-2023-53850",
"url": "https://bugzilla.suse.com/1254677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53850"
},
{
"cve": "CVE-2023-53862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53862"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: fix missing hfs_bnode_get() in __hfs_bnode_create\n\nSyzbot found a kernel BUG in hfs_bnode_put():\n\n kernel BUG at fs/hfs/bnode.c:466!\n invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n CPU: 0 PID: 3634 Comm: kworker/u4:5 Not tainted 6.1.0-rc7-syzkaller-00190-g97ee9d1c1696 #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\n Workqueue: writeback wb_workfn (flush-7:0)\n RIP: 0010:hfs_bnode_put+0x46f/0x480 fs/hfs/bnode.c:466\n Code: 8a 80 ff e9 73 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a0 fe ff ff 48 89 df e8 db 8a 80 ff e9 93 fe ff ff e8 a1 68 2c ff \u003c0f\u003e 0b e8 9a 68 2c ff 0f 0b 0f 1f 84 00 00 00 00 00 55 41 57 41 56\n RSP: 0018:ffffc90003b4f258 EFLAGS: 00010293\n RAX: ffffffff825e318f RBX: 0000000000000000 RCX: ffff8880739dd7c0\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n RBP: ffffc90003b4f430 R08: ffffffff825e2d9b R09: ffffed10045157d1\n R10: ffffed10045157d1 R11: 1ffff110045157d0 R12: ffff8880228abe80\n R13: ffff88807016c000 R14: dffffc0000000000 R15: ffff8880228abe00\n FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007fa6ebe88718 CR3: 000000001e93d000 CR4: 00000000003506f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \u003cTASK\u003e\n hfs_write_inode+0x1bc/0xb40\n write_inode fs/fs-writeback.c:1440 [inline]\n __writeback_single_inode+0x4d6/0x670 fs/fs-writeback.c:1652\n writeback_sb_inodes+0xb3b/0x18f0 fs/fs-writeback.c:1878\n __writeback_inodes_wb+0x125/0x420 fs/fs-writeback.c:1949\n wb_writeback+0x440/0x7b0 fs/fs-writeback.c:2054\n wb_check_start_all fs/fs-writeback.c:2176 [inline]\n wb_do_writeback fs/fs-writeback.c:2202 [inline]\n wb_workfn+0x827/0xef0 fs/fs-writeback.c:2235\n process_one_work+0x877/0xdb0 kernel/workqueue.c:2289\n worker_thread+0xb14/0x1330 kernel/workqueue.c:2436\n kthread+0x266/0x300 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\n \u003c/TASK\u003e\n\nThe BUG_ON() is triggered at here:\n\n/* Dispose of resources used by a node */\nvoid hfs_bnode_put(struct hfs_bnode *node)\n{\n\tif (node) {\n \t\t\u003cskipped\u003e\n \t\tBUG_ON(!atomic_read(\u0026node-\u003erefcnt)); \u003c- we have issue here!!!!\n \t\t\u003cskipped\u003e\n \t}\n}\n\nBy tracing the refcnt, I found the node is created by hfs_bmap_alloc()\nwith refcnt 1. Then the node is used by hfs_btree_write(). There is a\nmissing of hfs_bnode_get() after find the node. The issue happened in\nfollowing path:\n\n\u003calloc\u003e\n hfs_bmap_alloc\n hfs_bnode_find\n __hfs_bnode_create \u003c- allocate a new node with refcnt 1.\n hfs_bnode_put \u003c- decrease the refcnt\n\n\u003cwrite\u003e\n hfs_btree_write\n hfs_bnode_find\n __hfs_bnode_create\n hfs_bnode_findhash \u003c- find the node without refcnt increased.\n hfs_bnode_put\t \u003c- trigger the BUG_ON() since refcnt is 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53862",
"url": "https://www.suse.com/security/cve/CVE-2023-53862"
},
{
"category": "external",
"summary": "SUSE Bug 1254994 for CVE-2023-53862",
"url": "https://bugzilla.suse.com/1254994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-53862"
},
{
"cve": "CVE-2023-54014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54014"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()\n\nKlocwork reported warning of rport maybe NULL and will be dereferenced.\nrport returned by call to fc_bsg_to_rport() could be NULL and dereferenced.\n\nCheck valid rport returned by fc_bsg_to_rport().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54014",
"url": "https://www.suse.com/security/cve/CVE-2023-54014"
},
{
"category": "external",
"summary": "SUSE Bug 1256300 for CVE-2023-54014",
"url": "https://bugzilla.suse.com/1256300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54014"
},
{
"cve": "CVE-2023-54017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54017"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: fix possible memory leak in ibmebus_bus_init()\n\nIf device_register() returns error in ibmebus_bus_init(), name of kobject\nwhich is allocated in dev_set_name() called in device_add() is leaked.\n\nAs comment of device_add() says, it should call put_device() to drop\nthe reference count that was set in device_initialize() when it fails,\nso the name can be freed in kobject_cleanup().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54017",
"url": "https://www.suse.com/security/cve/CVE-2023-54017"
},
{
"category": "external",
"summary": "SUSE Bug 1255605 for CVE-2023-54017",
"url": "https://bugzilla.suse.com/1255605"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2023-54017"
},
{
"cve": "CVE-2023-54021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: set goal start correctly in ext4_mb_normalize_request\n\nWe need to set ac_g_ex to notify the goal start used in\next4_mb_find_by_goal. Set ac_g_ex instead of ac_f_ex in\next4_mb_normalize_request.\nBesides we should assure goal start is in range [first_data_block,\nblocks_count) as ext4_mb_initialize_context does.\n\n[ Added a check to make sure size is less than ar-\u003epright; otherwise\n we could end up passing an underflowed value of ar-\u003epright - size to\n ext4_get_group_no_and_offset(), which will trigger a BUG_ON later on.\n - TYT ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54021",
"url": "https://www.suse.com/security/cve/CVE-2023-54021"
},
{
"category": "external",
"summary": "SUSE Bug 1255600 for CVE-2023-54021",
"url": "https://bugzilla.suse.com/1255600"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54021"
},
{
"cve": "CVE-2023-54032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54032"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race when deleting quota root from the dirty cow roots list\n\nWhen disabling quotas we are deleting the quota root from the list\nfs_info-\u003edirty_cowonly_roots without taking the lock that protects it,\nwhich is struct btrfs_fs_info::trans_lock. This unsynchronized list\nmanipulation may cause chaos if there\u0027s another concurrent manipulation\nof this list, such as when adding a root to it with\nctree.c:add_root_to_dirty_list().\n\nThis can result in all sorts of weird failures caused by a race, such as\nthe following crash:\n\n [337571.278245] general protection fault, probably for non-canonical address 0xdead000000000108: 0000 [#1] PREEMPT SMP PTI\n [337571.278933] CPU: 1 PID: 115447 Comm: btrfs Tainted: G W 6.4.0-rc6-btrfs-next-134+ #1\n [337571.279153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n [337571.279572] RIP: 0010:commit_cowonly_roots+0x11f/0x250 [btrfs]\n [337571.279928] Code: 85 38 06 00 (...)\n [337571.280363] RSP: 0018:ffff9f63446efba0 EFLAGS: 00010206\n [337571.280582] RAX: ffff942d98ec2638 RBX: ffff9430b82b4c30 RCX: 0000000449e1c000\n [337571.280798] RDX: dead000000000100 RSI: ffff9430021e4900 RDI: 0000000000036070\n [337571.281015] RBP: ffff942d98ec2000 R08: ffff942d98ec2000 R09: 000000000000015b\n [337571.281254] R10: 0000000000000009 R11: 0000000000000001 R12: ffff942fe8fbf600\n [337571.281476] R13: ffff942dabe23040 R14: ffff942dabe20800 R15: ffff942d92cf3b48\n [337571.281723] FS: 00007f478adb7340(0000) GS:ffff94349fa40000(0000) knlGS:0000000000000000\n [337571.281950] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [337571.282184] CR2: 00007f478ab9a3d5 CR3: 000000001e02c001 CR4: 0000000000370ee0\n [337571.282416] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n [337571.282647] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n [337571.282874] Call Trace:\n [337571.283101] \u003cTASK\u003e\n [337571.283327] ? __die_body+0x1b/0x60\n [337571.283570] ? die_addr+0x39/0x60\n [337571.283796] ? exc_general_protection+0x22e/0x430\n [337571.284022] ? asm_exc_general_protection+0x22/0x30\n [337571.284251] ? commit_cowonly_roots+0x11f/0x250 [btrfs]\n [337571.284531] btrfs_commit_transaction+0x42e/0xf90 [btrfs]\n [337571.284803] ? _raw_spin_unlock+0x15/0x30\n [337571.285031] ? release_extent_buffer+0x103/0x130 [btrfs]\n [337571.285305] reset_balance_state+0x152/0x1b0 [btrfs]\n [337571.285578] btrfs_balance+0xa50/0x11e0 [btrfs]\n [337571.285864] ? __kmem_cache_alloc_node+0x14a/0x410\n [337571.286086] btrfs_ioctl+0x249a/0x3320 [btrfs]\n [337571.286358] ? mod_objcg_state+0xd2/0x360\n [337571.286577] ? refill_obj_stock+0xb0/0x160\n [337571.286798] ? seq_release+0x25/0x30\n [337571.287016] ? __rseq_handle_notify_resume+0x3ba/0x4b0\n [337571.287235] ? percpu_counter_add_batch+0x2e/0xa0\n [337571.287455] ? __x64_sys_ioctl+0x88/0xc0\n [337571.287675] __x64_sys_ioctl+0x88/0xc0\n [337571.287901] do_syscall_64+0x38/0x90\n [337571.288126] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n [337571.288352] RIP: 0033:0x7f478aaffe9b\n\nSo fix this by locking struct btrfs_fs_info::trans_lock before deleting\nthe quota root from that list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54032",
"url": "https://www.suse.com/security/cve/CVE-2023-54032"
},
{
"category": "external",
"summary": "SUSE Bug 1255617 for CVE-2023-54032",
"url": "https://bugzilla.suse.com/1255617"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54032"
},
{
"cve": "CVE-2023-54045",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54045"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naudit: fix possible soft lockup in __audit_inode_child()\n\nTracefs or debugfs maybe cause hundreds to thousands of PATH records,\ntoo many PATH records maybe cause soft lockup.\n\nFor example:\n 1. CONFIG_KASAN=y \u0026\u0026 CONFIG_PREEMPTION=n\n 2. auditctl -a exit,always -S open -k key\n 3. sysctl -w kernel.watchdog_thresh=5\n 4. mkdir /sys/kernel/debug/tracing/instances/test\n\nThere may be a soft lockup as follows:\n watchdog: BUG: soft lockup - CPU#45 stuck for 7s! [mkdir:15498]\n Kernel panic - not syncing: softlockup: hung tasks\n Call trace:\n dump_backtrace+0x0/0x30c\n show_stack+0x20/0x30\n dump_stack+0x11c/0x174\n panic+0x27c/0x494\n watchdog_timer_fn+0x2bc/0x390\n __run_hrtimer+0x148/0x4fc\n __hrtimer_run_queues+0x154/0x210\n hrtimer_interrupt+0x2c4/0x760\n arch_timer_handler_phys+0x48/0x60\n handle_percpu_devid_irq+0xe0/0x340\n __handle_domain_irq+0xbc/0x130\n gic_handle_irq+0x78/0x460\n el1_irq+0xb8/0x140\n __audit_inode_child+0x240/0x7bc\n tracefs_create_file+0x1b8/0x2a0\n trace_create_file+0x18/0x50\n event_create_dir+0x204/0x30c\n __trace_add_new_event+0xac/0x100\n event_trace_add_tracer+0xa0/0x130\n trace_array_create_dir+0x60/0x140\n trace_array_create+0x1e0/0x370\n instance_mkdir+0x90/0xd0\n tracefs_syscall_mkdir+0x68/0xa0\n vfs_mkdir+0x21c/0x34c\n do_mkdirat+0x1b4/0x1d4\n __arm64_sys_mkdirat+0x4c/0x60\n el0_svc_common.constprop.0+0xa8/0x240\n do_el0_svc+0x8c/0xc0\n el0_svc+0x20/0x30\n el0_sync_handler+0xb0/0xb4\n el0_sync+0x160/0x180\n\nTherefore, we add cond_resched() to __audit_inode_child() to fix it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54045",
"url": "https://www.suse.com/security/cve/CVE-2023-54045"
},
{
"category": "external",
"summary": "SUSE Bug 1256285 for CVE-2023-54045",
"url": "https://bugzilla.suse.com/1256285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54045"
},
{
"cve": "CVE-2023-54051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54051"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: do not allow gso_size to be set to GSO_BY_FRAGS\n\nOne missing check in virtio_net_hdr_to_skb() allowed\nsyzbot to crash kernels again [1]\n\nDo not allow gso_size to be set to GSO_BY_FRAGS (0xffff),\nbecause this magic value is used by the kernel.\n\n[1]\ngeneral protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]\nCPU: 0 PID: 5039 Comm: syz-executor401 Not tainted 6.5.0-rc5-next-20230809-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023\nRIP: 0010:skb_segment+0x1a52/0x3ef0 net/core/skbuff.c:4500\nCode: 00 00 00 e9 ab eb ff ff e8 6b 96 5d f9 48 8b 84 24 00 01 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c0f\u003e b6 04 02 84 c0 74 08 3c 03 0f 8e ea 21 00 00 48 8b 84 24 00 01\nRSP: 0018:ffffc90003d3f1c8 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 000000000001fffe RCX: 0000000000000000\nRDX: 000000000000000e RSI: ffffffff882a3115 RDI: 0000000000000070\nRBP: ffffc90003d3f378 R08: 0000000000000005 R09: 000000000000ffff\nR10: 000000000000ffff R11: 5ee4a93e456187d6 R12: 000000000001ffc6\nR13: dffffc0000000000 R14: 0000000000000008 R15: 000000000000ffff\nFS: 00005555563f2380(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020020000 CR3: 000000001626d000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003cTASK\u003e\nudp6_ufo_fragment+0x9d2/0xd50 net/ipv6/udp_offload.c:109\nipv6_gso_segment+0x5c4/0x17b0 net/ipv6/ip6_offload.c:120\nskb_mac_gso_segment+0x292/0x610 net/core/gso.c:53\n__skb_gso_segment+0x339/0x710 net/core/gso.c:124\nskb_gso_segment include/net/gso.h:83 [inline]\nvalidate_xmit_skb+0x3a5/0xf10 net/core/dev.c:3625\n__dev_queue_xmit+0x8f0/0x3d60 net/core/dev.c:4329\ndev_queue_xmit include/linux/netdevice.h:3082 [inline]\npacket_xmit+0x257/0x380 net/packet/af_packet.c:276\npacket_snd net/packet/af_packet.c:3087 [inline]\npacket_sendmsg+0x24c7/0x5570 net/packet/af_packet.c:3119\nsock_sendmsg_nosec net/socket.c:727 [inline]\nsock_sendmsg+0xd9/0x180 net/socket.c:750\n____sys_sendmsg+0x6ac/0x940 net/socket.c:2496\n___sys_sendmsg+0x135/0x1d0 net/socket.c:2550\n__sys_sendmsg+0x117/0x1e0 net/socket.c:2579\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7ff27cdb34d9",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54051",
"url": "https://www.suse.com/security/cve/CVE-2023-54051"
},
{
"category": "external",
"summary": "SUSE Bug 1256394 for CVE-2023-54051",
"url": "https://bugzilla.suse.com/1256394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54051"
},
{
"cve": "CVE-2023-54070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: clean up in all error paths when enabling SR-IOV\n\nAfter commit 50f303496d92 (\"igb: Enable SR-IOV after reinit\"), removing\nthe igb module could hang or crash (depending on the machine) when the\nmodule has been loaded with the max_vfs parameter set to some value != 0.\n\nIn case of one test machine with a dual port 82580, this hang occurred:\n\n[ 232.480687] igb 0000:41:00.1: removed PHC on enp65s0f1\n[ 233.093257] igb 0000:41:00.1: IOV Disabled\n[ 233.329969] pcieport 0000:40:01.0: AER: Multiple Uncorrected (Non-Fatal) err0\n[ 233.340302] igb 0000:41:00.0: PCIe Bus Error: severity=Uncorrected (Non-Fata)\n[ 233.352248] igb 0000:41:00.0: device [8086:1516] error status/mask=00100000\n[ 233.361088] igb 0000:41:00.0: [20] UnsupReq (First)\n[ 233.368183] igb 0000:41:00.0: AER: TLP Header: 40000001 0000040f cdbfc00c c\n[ 233.376846] igb 0000:41:00.1: PCIe Bus Error: severity=Uncorrected (Non-Fata)\n[ 233.388779] igb 0000:41:00.1: device [8086:1516] error status/mask=00100000\n[ 233.397629] igb 0000:41:00.1: [20] UnsupReq (First)\n[ 233.404736] igb 0000:41:00.1: AER: TLP Header: 40000001 0000040f cdbfc00c c\n[ 233.538214] pci 0000:41:00.1: AER: can\u0027t recover (no error_detected callback)\n[ 233.538401] igb 0000:41:00.0: removed PHC on enp65s0f0\n[ 233.546197] pcieport 0000:40:01.0: AER: device recovery failed\n[ 234.157244] igb 0000:41:00.0: IOV Disabled\n[ 371.619705] INFO: task irq/35-aerdrv:257 blocked for more than 122 seconds.\n[ 371.627489] Not tainted 6.4.0-dirty #2\n[ 371.632257] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this.\n[ 371.641000] task:irq/35-aerdrv state:D stack:0 pid:257 ppid:2 f0\n[ 371.650330] Call Trace:\n[ 371.653061] \u003cTASK\u003e\n[ 371.655407] __schedule+0x20e/0x660\n[ 371.659313] schedule+0x5a/0xd0\n[ 371.662824] schedule_preempt_disabled+0x11/0x20\n[ 371.667983] __mutex_lock.constprop.0+0x372/0x6c0\n[ 371.673237] ? __pfx_aer_root_reset+0x10/0x10\n[ 371.678105] report_error_detected+0x25/0x1c0\n[ 371.682974] ? __pfx_report_normal_detected+0x10/0x10\n[ 371.688618] pci_walk_bus+0x72/0x90\n[ 371.692519] pcie_do_recovery+0xb2/0x330\n[ 371.696899] aer_process_err_devices+0x117/0x170\n[ 371.702055] aer_isr+0x1c0/0x1e0\n[ 371.705661] ? __set_cpus_allowed_ptr+0x54/0xa0\n[ 371.710723] ? __pfx_irq_thread_fn+0x10/0x10\n[ 371.715496] irq_thread_fn+0x20/0x60\n[ 371.719491] irq_thread+0xe6/0x1b0\n[ 371.723291] ? __pfx_irq_thread_dtor+0x10/0x10\n[ 371.728255] ? __pfx_irq_thread+0x10/0x10\n[ 371.732731] kthread+0xe2/0x110\n[ 371.736243] ? __pfx_kthread+0x10/0x10\n[ 371.740430] ret_from_fork+0x2c/0x50\n[ 371.744428] \u003c/TASK\u003e\n\nThe reproducer was a simple script:\n\n #!/bin/sh\n for i in `seq 1 5`; do\n modprobe -rv igb\n modprobe -v igb max_vfs=1\n sleep 1\n modprobe -rv igb\n done\n\nIt turned out that this could only be reproduce on 82580 (quad and\ndual-port), but not on 82576, i350 and i210. Further debugging showed\nthat igb_enable_sriov()\u0027s call to pci_enable_sriov() is failing, because\ndev-\u003eis_physfn is 0 on 82580.\n\nPrior to commit 50f303496d92 (\"igb: Enable SR-IOV after reinit\"),\nigb_enable_sriov() jumped into the \"err_out\" cleanup branch. After this\ncommit it only returned the error code.\n\nSo the cleanup didn\u0027t take place, and the incorrect VF setup in the\nigb_adapter structure fooled the igb driver into assuming that VFs have\nbeen set up where no VF actually existed.\n\nFix this problem by cleaning up again if pci_enable_sriov() fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54070",
"url": "https://www.suse.com/security/cve/CVE-2023-54070"
},
{
"category": "external",
"summary": "SUSE Bug 1256364 for CVE-2023-54070",
"url": "https://bugzilla.suse.com/1256364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54070"
},
{
"cve": "CVE-2023-54091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/client: Fix memory leak in drm_client_target_cloned\n\ndmt_mode is allocated and never freed in this function.\nIt was found with the ast driver, but most drivers using generic fbdev\nsetup are probably affected.\n\nThis fixes the following kmemleak report:\n backtrace:\n [\u003c00000000b391296d\u003e] drm_mode_duplicate+0x45/0x220 [drm]\n [\u003c00000000e45bb5b3\u003e] drm_client_target_cloned.constprop.0+0x27b/0x480 [drm]\n [\u003c00000000ed2d3a37\u003e] drm_client_modeset_probe+0x6bd/0xf50 [drm]\n [\u003c0000000010e5cc9d\u003e] __drm_fb_helper_initial_config_and_unlock+0xb4/0x2c0 [drm_kms_helper]\n [\u003c00000000909f82ca\u003e] drm_fbdev_client_hotplug+0x2bc/0x4d0 [drm_kms_helper]\n [\u003c00000000063a69aa\u003e] drm_client_register+0x169/0x240 [drm]\n [\u003c00000000a8c61525\u003e] ast_pci_probe+0x142/0x190 [ast]\n [\u003c00000000987f19bb\u003e] local_pci_probe+0xdc/0x180\n [\u003c000000004fca231b\u003e] work_for_cpu_fn+0x4e/0xa0\n [\u003c0000000000b85301\u003e] process_one_work+0x8b7/0x1540\n [\u003c000000003375b17c\u003e] worker_thread+0x70a/0xed0\n [\u003c00000000b0d43cd9\u003e] kthread+0x29f/0x340\n [\u003c000000008d770833\u003e] ret_from_fork+0x1f/0x30\nunreferenced object 0xff11000333089a00 (size 128):",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54091",
"url": "https://www.suse.com/security/cve/CVE-2023-54091"
},
{
"category": "external",
"summary": "SUSE Bug 1256274 for CVE-2023-54091",
"url": "https://bugzilla.suse.com/1256274"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2023-54091"
},
{
"cve": "CVE-2023-54095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/iommu: Fix notifiers being shared by PCI and VIO buses\n\nfail_iommu_setup() registers the fail_iommu_bus_notifier struct to both\nPCI and VIO buses. struct notifier_block is a linked list node, so this\ncauses any notifiers later registered to either bus type to also be\nregistered to the other since they share the same node.\n\nThis causes issues in (at least) the vgaarb code, which registers a\nnotifier for PCI buses. pci_notify() ends up being called on a vio\ndevice, converted with to_pci_dev() even though it\u0027s not a PCI device,\nand finally makes a bad access in vga_arbiter_add_pci_device() as\ndiscovered with KASAN:\n\n BUG: KASAN: slab-out-of-bounds in vga_arbiter_add_pci_device+0x60/0xe00\n Read of size 4 at addr c000000264c26fdc by task swapper/0/1\n\n Call Trace:\n dump_stack_lvl+0x1bc/0x2b8 (unreliable)\n print_report+0x3f4/0xc60\n kasan_report+0x244/0x698\n __asan_load4+0xe8/0x250\n vga_arbiter_add_pci_device+0x60/0xe00\n pci_notify+0x88/0x444\n notifier_call_chain+0x104/0x320\n blocking_notifier_call_chain+0xa0/0x140\n device_add+0xac8/0x1d30\n device_register+0x58/0x80\n vio_register_device_node+0x9ac/0xce0\n vio_bus_scan_register_devices+0xc4/0x13c\n __machine_initcall_pseries_vio_device_init+0x94/0xf0\n do_one_initcall+0x12c/0xaa8\n kernel_init_freeable+0xa48/0xba8\n kernel_init+0x64/0x400\n ret_from_kernel_thread+0x5c/0x64\n\nFix this by creating separate notifier_block structs for each bus type.\n\n[mpe: Add #ifdef to fix CONFIG_IBMVIO=n build]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54095",
"url": "https://www.suse.com/security/cve/CVE-2023-54095"
},
{
"category": "external",
"summary": "SUSE Bug 1256271 for CVE-2023-54095",
"url": "https://bugzilla.suse.com/1256271"
},
{
"category": "external",
"summary": "SUSE Bug 1256272 for CVE-2023-54095",
"url": "https://bugzilla.suse.com/1256272"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54095"
},
{
"cve": "CVE-2023-54108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54108"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests\n\nThe following message and call trace was seen with debug kernels:\n\nDMA-API: qla2xxx 0000:41:00.0: device driver failed to check map\nerror [device address=0x00000002a3ff38d8] [size=1024 bytes] [mapped as\nsingle]\nWARNING: CPU: 0 PID: 2930 at kernel/dma/debug.c:1017\n\t check_unmap+0xf42/0x1990\n\nCall Trace:\n\tdebug_dma_unmap_page+0xc9/0x100\n\tqla_nvme_ls_unmap+0x141/0x210 [qla2xxx]\n\nRemove DMA mapping from the driver altogether, as it is already done by FC\nlayer. This prevents the warning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54108",
"url": "https://www.suse.com/security/cve/CVE-2023-54108"
},
{
"category": "external",
"summary": "SUSE Bug 1256355 for CVE-2023-54108",
"url": "https://bugzilla.suse.com/1256355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54108"
},
{
"cve": "CVE-2023-54110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: rndis_host: Secure rndis_query check against int overflow\n\nVariables off and len typed as uint32 in rndis_query function\nare controlled by incoming RNDIS response message thus their\nvalue may be manipulated. Setting off to a unexpectetly large\nvalue will cause the sum with len and 8 to overflow and pass\nthe implemented validation step. Consequently the response\npointer will be referring to a location past the expected\nbuffer boundaries allowing information leakage e.g. via\nRNDIS_OID_802_3_PERMANENT_ADDRESS OID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54110",
"url": "https://www.suse.com/security/cve/CVE-2023-54110"
},
{
"category": "external",
"summary": "SUSE Bug 1256353 for CVE-2023-54110",
"url": "https://bugzilla.suse.com/1256353"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54110"
},
{
"cve": "CVE-2023-54119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54119"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninotify: Avoid reporting event with invalid wd\n\nWhen inotify_freeing_mark() races with inotify_handle_inode_event() it\ncan happen that inotify_handle_inode_event() sees that i_mark-\u003ewd got\nalready reset to -1 and reports this value to userspace which can\nconfuse the inotify listener. Avoid the problem by validating that wd is\nsensible (and pretend the mark got removed before the event got\ngenerated otherwise).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54119",
"url": "https://www.suse.com/security/cve/CVE-2023-54119"
},
{
"category": "external",
"summary": "SUSE Bug 1256349 for CVE-2023-54119",
"url": "https://bugzilla.suse.com/1256349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54119"
},
{
"cve": "CVE-2023-54120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix race condition in hidp_session_thread\n\nThere is a potential race condition in hidp_session_thread that may\nlead to use-after-free. For instance, the timer is active while\nhidp_del_timer is called in hidp_session_thread(). After hidp_session_put,\nthen \u0027session\u0027 will be freed, causing kernel panic when hidp_idle_timeout\nis running.\n\nThe solution is to use del_timer_sync instead of del_timer.\n\nHere is the call trace:\n\n? hidp_session_probe+0x780/0x780\ncall_timer_fn+0x2d/0x1e0\n__run_timers.part.0+0x569/0x940\nhidp_session_probe+0x780/0x780\ncall_timer_fn+0x1e0/0x1e0\nktime_get+0x5c/0xf0\nlapic_next_deadline+0x2c/0x40\nclockevents_program_event+0x205/0x320\nrun_timer_softirq+0xa9/0x1b0\n__do_softirq+0x1b9/0x641\n__irq_exit_rcu+0xdc/0x190\nirq_exit_rcu+0xe/0x20\nsysvec_apic_timer_interrupt+0xa1/0xc0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54120",
"url": "https://www.suse.com/security/cve/CVE-2023-54120"
},
{
"category": "external",
"summary": "SUSE Bug 1256133 for CVE-2023-54120",
"url": "https://bugzilla.suse.com/1256133"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54120"
},
{
"cve": "CVE-2023-54123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54123"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid10: fix memleak for \u0027conf-\u003ebio_split\u0027\n\nIn the error path of raid10_run(), \u0027conf\u0027 need be freed, however,\n\u0027conf-\u003ebio_split\u0027 is missed and memory will be leaked.\n\nSince there are 3 places to free \u0027conf\u0027, factor out a helper to fix the\nproblem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54123",
"url": "https://www.suse.com/security/cve/CVE-2023-54123"
},
{
"category": "external",
"summary": "SUSE Bug 1256142 for CVE-2023-54123",
"url": "https://bugzilla.suse.com/1256142"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54123"
},
{
"cve": "CVE-2023-54130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54130"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling\n\nCommit 55d1cbbbb29e (\"hfs/hfsplus: use WARN_ON for sanity check\") fixed\na build warning by turning a comment into a WARN_ON(), but it turns out\nthat syzbot then complains because it can trigger said warning with a\ncorrupted hfs image.\n\nThe warning actually does warn about a bad situation, but we are much\nbetter off just handling it as the error it is. So rather than warn\nabout us doing bad things, stop doing the bad things and return -EIO.\n\nWhile at it, also fix a memory leak that was introduced by an earlier\nfix for a similar syzbot warning situation, and add a check for one case\nthat historically wasn\u0027t handled at all (ie neither comment nor\nsubsequent WARN_ON).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54130",
"url": "https://www.suse.com/security/cve/CVE-2023-54130"
},
{
"category": "external",
"summary": "SUSE Bug 1256114 for CVE-2023-54130",
"url": "https://bugzilla.suse.com/1256114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54130"
},
{
"cve": "CVE-2023-54146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kexec: Fix double-free of elf header buffer\n\nAfter\n\n b3e34a47f989 (\"x86/kexec: fix memory leak of elf header buffer\"),\n\nfreeing image-\u003eelf_headers in the error path of crash_load_segments()\nis not needed because kimage_file_post_load_cleanup() will take\ncare of that later. And not clearing it could result in a double-free.\n\nDrop the superfluous vfree() call at the error path of\ncrash_load_segments().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54146",
"url": "https://www.suse.com/security/cve/CVE-2023-54146"
},
{
"category": "external",
"summary": "SUSE Bug 1256091 for CVE-2023-54146",
"url": "https://bugzilla.suse.com/1256091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54146"
},
{
"cve": "CVE-2023-54168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx4: Prevent shift wrapping in set_user_sq_size()\n\nThe ucmd-\u003elog_sq_bb_count variable is controlled by the user so this\nshift can wrap. Fix it by using check_shl_overflow() in the same way\nthat it was done in commit 515f60004ed9 (\"RDMA/hns: Prevent undefined\nbehavior in hns_roce_set_user_sq_size()\").",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54168",
"url": "https://www.suse.com/security/cve/CVE-2023-54168"
},
{
"category": "external",
"summary": "SUSE Bug 1256053 for CVE-2023-54168",
"url": "https://bugzilla.suse.com/1256053"
},
{
"category": "external",
"summary": "SUSE Bug 1256054 for CVE-2023-54168",
"url": "https://bugzilla.suse.com/1256054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "important"
}
],
"title": "CVE-2023-54168"
},
{
"cve": "CVE-2023-54170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54170"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkeys: Fix linking a duplicate key to a keyring\u0027s assoc_array\n\nWhen making a DNS query inside the kernel using dns_query(), the request\ncode can in rare cases end up creating a duplicate index key in the\nassoc_array of the destination keyring. It is eventually found by\na BUG_ON() check in the assoc_array implementation and results in\na crash.\n\nExample report:\n[2158499.700025] kernel BUG at ../lib/assoc_array.c:652!\n[2158499.700039] invalid opcode: 0000 [#1] SMP PTI\n[2158499.700065] CPU: 3 PID: 31985 Comm: kworker/3:1 Kdump: loaded Not tainted 5.3.18-150300.59.90-default #1 SLE15-SP3\n[2158499.700096] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n[2158499.700351] Workqueue: cifsiod cifs_resolve_server [cifs]\n[2158499.700380] RIP: 0010:assoc_array_insert+0x85f/0xa40\n[2158499.700401] Code: ff 74 2b 48 8b 3b 49 8b 45 18 4c 89 e6 48 83 e7 fe e8 95 ec 74 00 3b 45 88 7d db 85 c0 79 d4 0f 0b 0f 0b 0f 0b e8 41 f2 be ff \u003c0f\u003e 0b 0f 0b 81 7d 88 ff ff ff 7f 4c 89 eb 4c 8b ad 58 ff ff ff 0f\n[2158499.700448] RSP: 0018:ffffc0bd6187faf0 EFLAGS: 00010282\n[2158499.700470] RAX: ffff9f1ea7da2fe8 RBX: ffff9f1ea7da2fc1 RCX: 0000000000000005\n[2158499.700492] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000000\n[2158499.700515] RBP: ffffc0bd6187fbb0 R08: ffff9f185faf1100 R09: 0000000000000000\n[2158499.700538] R10: ffff9f1ea7da2cc0 R11: 000000005ed8cec8 R12: ffffc0bd6187fc28\n[2158499.700561] R13: ffff9f15feb8d000 R14: ffff9f1ea7da2fc0 R15: ffff9f168dc0d740\n[2158499.700585] FS: 0000000000000000(0000) GS:ffff9f185fac0000(0000) knlGS:0000000000000000\n[2158499.700610] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[2158499.700630] CR2: 00007fdd94fca238 CR3: 0000000809d8c006 CR4: 00000000003706e0\n[2158499.700702] Call Trace:\n[2158499.700741] ? key_alloc+0x447/0x4b0\n[2158499.700768] ? __key_link_begin+0x43/0xa0\n[2158499.700790] __key_link_begin+0x43/0xa0\n[2158499.700814] request_key_and_link+0x2c7/0x730\n[2158499.700847] ? dns_resolver_read+0x20/0x20 [dns_resolver]\n[2158499.700873] ? key_default_cmp+0x20/0x20\n[2158499.700898] request_key_tag+0x43/0xa0\n[2158499.700926] dns_query+0x114/0x2ca [dns_resolver]\n[2158499.701127] dns_resolve_server_name_to_ip+0x194/0x310 [cifs]\n[2158499.701164] ? scnprintf+0x49/0x90\n[2158499.701190] ? __switch_to_asm+0x40/0x70\n[2158499.701211] ? __switch_to_asm+0x34/0x70\n[2158499.701405] reconn_set_ipaddr_from_hostname+0x81/0x2a0 [cifs]\n[2158499.701603] cifs_resolve_server+0x4b/0xd0 [cifs]\n[2158499.701632] process_one_work+0x1f8/0x3e0\n[2158499.701658] worker_thread+0x2d/0x3f0\n[2158499.701682] ? process_one_work+0x3e0/0x3e0\n[2158499.701703] kthread+0x10d/0x130\n[2158499.701723] ? kthread_park+0xb0/0xb0\n[2158499.701746] ret_from_fork+0x1f/0x40\n\nThe situation occurs as follows:\n* Some kernel facility invokes dns_query() to resolve a hostname, for\n example, \"abcdef\". The function registers its global DNS resolver\n cache as current-\u003ecred.thread_keyring and passes the query to\n request_key_net() -\u003e request_key_tag() -\u003e request_key_and_link().\n* Function request_key_and_link() creates a keyring_search_context\n object. Its match_data.cmp method gets set via a call to\n type-\u003ematch_preparse() (resolves to dns_resolver_match_preparse()) to\n dns_resolver_cmp().\n* Function request_key_and_link() continues and invokes\n search_process_keyrings_rcu() which returns that a given key was not\n found. The control is then passed to request_key_and_link() -\u003e\n construct_alloc_key().\n* Concurrently to that, a second task similarly makes a DNS query for\n \"abcdef.\" and its result gets inserted into the DNS resolver cache.\n* Back on the first task, function construct_alloc_key() first runs\n __key_link_begin() to determine an assoc_array_edit operation to\n insert a new key. Index keys in the array are compared exactly as-is,\n using keyring_compare_object(). The operation \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54170",
"url": "https://www.suse.com/security/cve/CVE-2023-54170"
},
{
"category": "external",
"summary": "SUSE Bug 1256045 for CVE-2023-54170",
"url": "https://bugzilla.suse.com/1256045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54170"
},
{
"cve": "CVE-2023-54177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nquota: fix warning in dqgrab()\n\nThere\u0027s issue as follows when do fault injection:\nWARNING: CPU: 1 PID: 14870 at include/linux/quotaops.h:51 dquot_disable+0x13b7/0x18c0\nModules linked in:\nCPU: 1 PID: 14870 Comm: fsconfig Not tainted 6.3.0-next-20230505-00006-g5107a9c821af-dirty #541\nRIP: 0010:dquot_disable+0x13b7/0x18c0\nRSP: 0018:ffffc9000acc79e0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88825e41b980\nRDX: 0000000000000000 RSI: ffff88825e41b980 RDI: 0000000000000002\nRBP: ffff888179f68000 R08: ffffffff82087ca7 R09: 0000000000000000\nR10: 0000000000000001 R11: ffffed102f3ed026 R12: ffff888179f68130\nR13: ffff888179f68110 R14: dffffc0000000000 R15: ffff888179f68118\nFS: 00007f450a073740(0000) GS:ffff88882fc00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe96f2efd8 CR3: 000000025c8ad000 CR4: 00000000000006e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n dquot_load_quota_sb+0xd53/0x1060\n dquot_resume+0x172/0x230\n ext4_reconfigure+0x1dc6/0x27b0\n reconfigure_super+0x515/0xa90\n __x64_sys_fsconfig+0xb19/0xd20\n do_syscall_64+0x39/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nAbove issue may happens as follows:\nProcessA ProcessB ProcessC\nsys_fsconfig\n vfs_fsconfig_locked\n reconfigure_super\n ext4_remount\n dquot_suspend -\u003e suspend all type quota\n\n sys_fsconfig\n vfs_fsconfig_locked\n reconfigure_super\n ext4_remount\n dquot_resume\n ret = dquot_load_quota_sb\n add_dquot_ref\n do_open -\u003e open file O_RDWR\n vfs_open\n do_dentry_open\n get_write_access\n atomic_inc_unless_negative(\u0026inode-\u003ei_writecount)\n ext4_file_open\n dquot_file_open\n dquot_initialize\n __dquot_initialize\n dqget\n\t\t\t\t\t\t atomic_inc(\u0026dquot-\u003edq_count);\n\n __dquot_initialize\n __dquot_initialize\n dqget\n if (!test_bit(DQ_ACTIVE_B, \u0026dquot-\u003edq_flags))\n ext4_acquire_dquot\n\t\t\t -\u003e Return error DQ_ACTIVE_B flag isn\u0027t set\n dquot_disable\n\t\t\t invalidate_dquots\n\t\t\t if (atomic_read(\u0026dquot-\u003edq_count))\n\t dqgrab\n\t\t\t WARN_ON_ONCE(!test_bit(DQ_ACTIVE_B, \u0026dquot-\u003edq_flags))\n\t -\u003e Trigger warning\n\nIn the above scenario, \u0027dquot-\u003edq_flags\u0027 has no DQ_ACTIVE_B is normal when\ndqgrab().\nTo solve above issue just replace the dqgrab() use in invalidate_dquots() with\natomic_inc(\u0026dquot-\u003edq_count).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54177",
"url": "https://www.suse.com/security/cve/CVE-2023-54177"
},
{
"category": "external",
"summary": "SUSE Bug 1255993 for CVE-2023-54177",
"url": "https://bugzilla.suse.com/1255993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2023-54177"
},
{
"cve": "CVE-2023-54179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54179"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Array index may go out of bound\n\nKlocwork reports array \u0027vha-\u003ehost_str\u0027 of size 16 may use index value(s)\n16..19. Use snprintf() instead of sprintf().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54179",
"url": "https://www.suse.com/security/cve/CVE-2023-54179"
},
{
"category": "external",
"summary": "SUSE Bug 1255994 for CVE-2023-54179",
"url": "https://bugzilla.suse.com/1255994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54179"
},
{
"cve": "CVE-2023-54186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: altmodes/displayport: fix pin_assignment_show\n\nThis patch fixes negative indexing of buf array in pin_assignment_show\nwhen get_current_pin_assignments returns 0 i.e. no compatible pin\nassignments are found.\n\nBUG: KASAN: use-after-free in pin_assignment_show+0x26c/0x33c\n...\nCall trace:\ndump_backtrace+0x110/0x204\ndump_stack_lvl+0x84/0xbc\nprint_report+0x358/0x974\nkasan_report+0x9c/0xfc\n__do_kernel_fault+0xd4/0x2d4\ndo_bad_area+0x48/0x168\ndo_tag_check_fault+0x24/0x38\ndo_mem_abort+0x6c/0x14c\nel1_abort+0x44/0x68\nel1h_64_sync_handler+0x64/0xa4\nel1h_64_sync+0x78/0x7c\npin_assignment_show+0x26c/0x33c\ndev_attr_show+0x50/0xc0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54186",
"url": "https://www.suse.com/security/cve/CVE-2023-54186"
},
{
"category": "external",
"summary": "SUSE Bug 1255985 for CVE-2023-54186",
"url": "https://bugzilla.suse.com/1255985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54186"
},
{
"cve": "CVE-2023-54197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work\"\n\nThis reverts commit 1e9ac114c4428fdb7ff4635b45d4f46017e8916f.\n\nThis patch introduces a possible null-ptr-def problem. Revert it. And the\nfixed bug by this patch have resolved by commit 73f7b171b7c0 (\"Bluetooth:\nbtsdio: fix use after free bug in btsdio_remove due to race condition\").",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54197",
"url": "https://www.suse.com/security/cve/CVE-2023-54197"
},
{
"category": "external",
"summary": "SUSE Bug 1255969 for CVE-2023-54197",
"url": "https://bugzilla.suse.com/1255969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54197"
},
{
"cve": "CVE-2023-54211",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54211"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix warning in trace_buffered_event_disable()\n\nWarning happened in trace_buffered_event_disable() at\n WARN_ON_ONCE(!trace_buffered_event_ref)\n\n Call Trace:\n ? __warn+0xa5/0x1b0\n ? trace_buffered_event_disable+0x189/0x1b0\n __ftrace_event_enable_disable+0x19e/0x3e0\n free_probe_data+0x3b/0xa0\n unregister_ftrace_function_probe_func+0x6b8/0x800\n event_enable_func+0x2f0/0x3d0\n ftrace_process_regex.isra.0+0x12d/0x1b0\n ftrace_filter_write+0xe6/0x140\n vfs_write+0x1c9/0x6f0\n [...]\n\nThe cause of the warning is in __ftrace_event_enable_disable(),\ntrace_buffered_event_enable() was called once while\ntrace_buffered_event_disable() was called twice.\nReproduction script show as below, for analysis, see the comments:\n ```\n #!/bin/bash\n\n cd /sys/kernel/tracing/\n\n # 1. Register a \u0027disable_event\u0027 command, then:\n # 1) SOFT_DISABLED_BIT was set;\n # 2) trace_buffered_event_enable() was called first time;\n echo \u0027cmdline_proc_show:disable_event:initcall:initcall_finish\u0027 \u003e \\\n set_ftrace_filter\n\n # 2. Enable the event registered, then:\n # 1) SOFT_DISABLED_BIT was cleared;\n # 2) trace_buffered_event_disable() was called first time;\n echo 1 \u003e events/initcall/initcall_finish/enable\n\n # 3. Try to call into cmdline_proc_show(), then SOFT_DISABLED_BIT was\n # set again!!!\n cat /proc/cmdline\n\n # 4. Unregister the \u0027disable_event\u0027 command, then:\n # 1) SOFT_DISABLED_BIT was cleared again;\n # 2) trace_buffered_event_disable() was called second time!!!\n echo \u0027!cmdline_proc_show:disable_event:initcall:initcall_finish\u0027 \u003e \\\n set_ftrace_filter\n ```\n\nTo fix it, IIUC, we can change to call trace_buffered_event_enable() at\nfist time soft-mode enabled, and call trace_buffered_event_disable() at\nlast time soft-mode disabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54211",
"url": "https://www.suse.com/security/cve/CVE-2023-54211"
},
{
"category": "external",
"summary": "SUSE Bug 1255843 for CVE-2023-54211",
"url": "https://bugzilla.suse.com/1255843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54211"
},
{
"cve": "CVE-2023-54213",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54213"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: sisusbvga: Add endpoint checks\n\nThe syzbot fuzzer was able to provoke a WARNING from the sisusbvga driver:\n\n------------[ cut here ]------------\nusb 1-1: BOGUS urb xfer, pipe 3 != type 1\nWARNING: CPU: 1 PID: 26 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504\nModules linked in:\nCPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 6.2.0-rc5-syzkaller-00199-g5af6ce704936 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504\nCode: 7c 24 18 e8 6c 50 80 fb 48 8b 7c 24 18 e8 62 1a 01 ff 41 89 d8 44 89 e1 4c 89 ea 48 89 c6 48 c7 c7 60 b1 fa 8a e8 84 b0 be 03 \u003c0f\u003e 0b e9 58 f8 ff ff e8 3e 50 80 fb 48 81 c5 c0 05 00 00 e9 84 f7\nRSP: 0018:ffffc90000a1ed18 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000\nRDX: ffff888012783a80 RSI: ffffffff816680ec RDI: fffff52000143d95\nRBP: ffff888079020000 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000080000000 R11: 0000000000000000 R12: 0000000000000003\nR13: ffff888017d33370 R14: 0000000000000003 R15: ffff888021213600\nFS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005592753a60b0 CR3: 0000000022899000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n sisusb_bulkout_msg drivers/usb/misc/sisusbvga/sisusbvga.c:224 [inline]\n sisusb_send_bulk_msg.constprop.0+0x904/0x1230 drivers/usb/misc/sisusbvga/sisusbvga.c:379\n sisusb_send_bridge_packet drivers/usb/misc/sisusbvga/sisusbvga.c:567 [inline]\n sisusb_do_init_gfxdevice drivers/usb/misc/sisusbvga/sisusbvga.c:2077 [inline]\n sisusb_init_gfxdevice+0x87b/0x4000 drivers/usb/misc/sisusbvga/sisusbvga.c:2177\n sisusb_probe+0x9cd/0xbe2 drivers/usb/misc/sisusbvga/sisusbvga.c:2869\n...\n\nThe problem was caused by the fact that the driver does not check\nwhether the endpoints it uses are actually present and have the\nappropriate types. This can be fixed by adding a simple check of\nthe endpoints.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54213",
"url": "https://www.suse.com/security/cve/CVE-2023-54213"
},
{
"category": "external",
"summary": "SUSE Bug 1255953 for CVE-2023-54213",
"url": "https://bugzilla.suse.com/1255953"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54213"
},
{
"cve": "CVE-2023-54214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix potential user-after-free\n\nThis fixes all instances of which requires to allocate a buffer calling\nalloc_skb which may release the chan lock and reacquire later which\nmakes it possible that the chan is disconnected in the meantime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54214",
"url": "https://www.suse.com/security/cve/CVE-2023-54214"
},
{
"category": "external",
"summary": "SUSE Bug 1255954 for CVE-2023-54214",
"url": "https://bugzilla.suse.com/1255954"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54214"
},
{
"cve": "CVE-2023-54220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54220"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: Fix oops for port-\u003epm on uart_change_pm()\n\nUnloading a hardware specific 8250 driver can produce error \"Unable to\nhandle kernel paging request at virtual address\" about ten seconds after\nunloading the driver. This happens on uart_hangup() calling\nuart_change_pm().\n\nTurns out commit 04e82793f068 (\"serial: 8250: Reinit port-\u003epm on port\nspecific driver unbind\") was only a partial fix. If the hardware specific\ndriver has initialized port-\u003epm function, we need to clear port-\u003epm too.\nJust reinitializing port-\u003eops does not do this. Otherwise serial8250_pm()\nwill call port-\u003epm() instead of serial8250_do_pm().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54220",
"url": "https://www.suse.com/security/cve/CVE-2023-54220"
},
{
"category": "external",
"summary": "SUSE Bug 1255949 for CVE-2023-54220",
"url": "https://bugzilla.suse.com/1255949"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54220"
},
{
"cve": "CVE-2023-54224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix lockdep splat and potential deadlock after failure running delayed items\n\nWhen running delayed items we are holding a delayed node\u0027s mutex and then\nwe will attempt to modify a subvolume btree to insert/update/delete the\ndelayed items. However if have an error during the insertions for example,\nbtrfs_insert_delayed_items() may return with a path that has locked extent\nbuffers (a leaf at the very least), and then we attempt to release the\ndelayed node at __btrfs_run_delayed_items(), which requires taking the\ndelayed node\u0027s mutex, causing an ABBA type of deadlock. This was reported\nby syzbot and the lockdep splat is the following:\n\n WARNING: possible circular locking dependency detected\n 6.5.0-rc7-syzkaller-00024-g93f5de5f648d #0 Not tainted\n ------------------------------------------------------\n syz-executor.2/13257 is trying to acquire lock:\n ffff88801835c0c0 (\u0026delayed_node-\u003emutex){+.+.}-{3:3}, at: __btrfs_release_delayed_node+0x9a/0xaa0 fs/btrfs/delayed-inode.c:256\n\n but task is already holding lock:\n ffff88802a5ab8e8 (btrfs-tree-00){++++}-{3:3}, at: __btrfs_tree_lock+0x3c/0x2a0 fs/btrfs/locking.c:198\n\n which lock already depends on the new lock.\n\n the existing dependency chain (in reverse order) is:\n\n -\u003e #1 (btrfs-tree-00){++++}-{3:3}:\n __lock_release kernel/locking/lockdep.c:5475 [inline]\n lock_release+0x36f/0x9d0 kernel/locking/lockdep.c:5781\n up_write+0x79/0x580 kernel/locking/rwsem.c:1625\n btrfs_tree_unlock_rw fs/btrfs/locking.h:189 [inline]\n btrfs_unlock_up_safe+0x179/0x3b0 fs/btrfs/locking.c:239\n search_leaf fs/btrfs/ctree.c:1986 [inline]\n btrfs_search_slot+0x2511/0x2f80 fs/btrfs/ctree.c:2230\n btrfs_insert_empty_items+0x9c/0x180 fs/btrfs/ctree.c:4376\n btrfs_insert_delayed_item fs/btrfs/delayed-inode.c:746 [inline]\n btrfs_insert_delayed_items fs/btrfs/delayed-inode.c:824 [inline]\n __btrfs_commit_inode_delayed_items+0xd24/0x2410 fs/btrfs/delayed-inode.c:1111\n __btrfs_run_delayed_items+0x1db/0x430 fs/btrfs/delayed-inode.c:1153\n flush_space+0x269/0xe70 fs/btrfs/space-info.c:723\n btrfs_async_reclaim_metadata_space+0x106/0x350 fs/btrfs/space-info.c:1078\n process_one_work+0x92c/0x12c0 kernel/workqueue.c:2600\n worker_thread+0xa63/0x1210 kernel/workqueue.c:2751\n kthread+0x2b8/0x350 kernel/kthread.c:389\n ret_from_fork+0x2e/0x60 arch/x86/kernel/process.c:145\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n\n -\u003e #0 (\u0026delayed_node-\u003emutex){+.+.}-{3:3}:\n check_prev_add kernel/locking/lockdep.c:3142 [inline]\n check_prevs_add kernel/locking/lockdep.c:3261 [inline]\n validate_chain kernel/locking/lockdep.c:3876 [inline]\n __lock_acquire+0x39ff/0x7f70 kernel/locking/lockdep.c:5144\n lock_acquire+0x1e3/0x520 kernel/locking/lockdep.c:5761\n __mutex_lock_common+0x1d8/0x2530 kernel/locking/mutex.c:603\n __mutex_lock kernel/locking/mutex.c:747 [inline]\n mutex_lock_nested+0x1b/0x20 kernel/locking/mutex.c:799\n __btrfs_release_delayed_node+0x9a/0xaa0 fs/btrfs/delayed-inode.c:256\n btrfs_release_delayed_node fs/btrfs/delayed-inode.c:281 [inline]\n __btrfs_run_delayed_items+0x2b5/0x430 fs/btrfs/delayed-inode.c:1156\n btrfs_commit_transaction+0x859/0x2ff0 fs/btrfs/transaction.c:2276\n btrfs_sync_file+0xf56/0x1330 fs/btrfs/file.c:1988\n vfs_fsync_range fs/sync.c:188 [inline]\n vfs_fsync fs/sync.c:202 [inline]\n do_fsync fs/sync.c:212 [inline]\n __do_sys_fsync fs/sync.c:220 [inline]\n __se_sys_fsync fs/sync.c:218 [inline]\n __x64_sys_fsync+0x196/0x1e0 fs/sync.c:218\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\n other info that\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54224",
"url": "https://www.suse.com/security/cve/CVE-2023-54224"
},
{
"category": "external",
"summary": "SUSE Bug 1255951 for CVE-2023-54224",
"url": "https://bugzilla.suse.com/1255951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54224"
},
{
"cve": "CVE-2023-54226",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54226"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix data races around sk-\u003esk_shutdown.\n\nKCSAN found a data race around sk-\u003esk_shutdown where unix_release_sock()\nand unix_shutdown() update it under unix_state_lock(), OTOH unix_poll()\nand unix_dgram_poll() read it locklessly.\n\nWe need to annotate the writes and reads with WRITE_ONCE() and READ_ONCE().\n\nBUG: KCSAN: data-race in unix_poll / unix_release_sock\n\nwrite to 0xffff88800d0f8aec of 1 bytes by task 264 on cpu 0:\n unix_release_sock+0x75c/0x910 net/unix/af_unix.c:631\n unix_release+0x59/0x80 net/unix/af_unix.c:1042\n __sock_release+0x7d/0x170 net/socket.c:653\n sock_close+0x19/0x30 net/socket.c:1397\n __fput+0x179/0x5e0 fs/file_table.c:321\n ____fput+0x15/0x20 fs/file_table.c:349\n task_work_run+0x116/0x1a0 kernel/task_work.c:179\n resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]\n exit_to_user_mode_loop kernel/entry/common.c:171 [inline]\n exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204\n __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]\n syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297\n do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nread to 0xffff88800d0f8aec of 1 bytes by task 222 on cpu 1:\n unix_poll+0xa3/0x2a0 net/unix/af_unix.c:3170\n sock_poll+0xcf/0x2b0 net/socket.c:1385\n vfs_poll include/linux/poll.h:88 [inline]\n ep_item_poll.isra.0+0x78/0xc0 fs/eventpoll.c:855\n ep_send_events fs/eventpoll.c:1694 [inline]\n ep_poll fs/eventpoll.c:1823 [inline]\n do_epoll_wait+0x6c4/0xea0 fs/eventpoll.c:2258\n __do_sys_epoll_wait fs/eventpoll.c:2270 [inline]\n __se_sys_epoll_wait fs/eventpoll.c:2265 [inline]\n __x64_sys_epoll_wait+0xcc/0x190 fs/eventpoll.c:2265\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nvalue changed: 0x00 -\u003e 0x03\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 1 PID: 222 Comm: dbus-broker Not tainted 6.3.0-rc7-02330-gca6270c12e20 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54226",
"url": "https://www.suse.com/security/cve/CVE-2023-54226"
},
{
"category": "external",
"summary": "SUSE Bug 1255841 for CVE-2023-54226",
"url": "https://bugzilla.suse.com/1255841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54226"
},
{
"cve": "CVE-2023-54236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/net_failover: fix txq exceeding warning\n\nThe failover txq is inited as 16 queues.\nwhen a packet is transmitted from the failover device firstly,\nthe failover device will select the queue which is returned from\nthe primary device if the primary device is UP and running.\nIf the primary device txq is bigger than the default 16,\nit can lead to the following warning:\neth0 selects TX queue 18, but real number of TX queues is 16\n\nThe warning backtrace is:\n[ 32.146376] CPU: 18 PID: 9134 Comm: chronyd Tainted: G E 6.2.8-1.el7.centos.x86_64 #1\n[ 32.147175] Hardware name: Red Hat KVM, BIOS 1.10.2-3.el7_4.1 04/01/2014\n[ 32.147730] Call Trace:\n[ 32.147971] \u003cTASK\u003e\n[ 32.148183] dump_stack_lvl+0x48/0x70\n[ 32.148514] dump_stack+0x10/0x20\n[ 32.148820] netdev_core_pick_tx+0xb1/0xe0\n[ 32.149180] __dev_queue_xmit+0x529/0xcf0\n[ 32.149533] ? __check_object_size.part.0+0x21c/0x2c0\n[ 32.149967] ip_finish_output2+0x278/0x560\n[ 32.150327] __ip_finish_output+0x1fe/0x2f0\n[ 32.150690] ip_finish_output+0x2a/0xd0\n[ 32.151032] ip_output+0x7a/0x110\n[ 32.151337] ? __pfx_ip_finish_output+0x10/0x10\n[ 32.151733] ip_local_out+0x5e/0x70\n[ 32.152054] ip_send_skb+0x19/0x50\n[ 32.152366] udp_send_skb.isra.0+0x163/0x3a0\n[ 32.152736] udp_sendmsg+0xba8/0xec0\n[ 32.153060] ? __folio_memcg_unlock+0x25/0x60\n[ 32.153445] ? __pfx_ip_generic_getfrag+0x10/0x10\n[ 32.153854] ? sock_has_perm+0x85/0xa0\n[ 32.154190] inet_sendmsg+0x6d/0x80\n[ 32.154508] ? inet_sendmsg+0x6d/0x80\n[ 32.154838] sock_sendmsg+0x62/0x70\n[ 32.155152] ____sys_sendmsg+0x134/0x290\n[ 32.155499] ___sys_sendmsg+0x81/0xc0\n[ 32.155828] ? _get_random_bytes.part.0+0x79/0x1a0\n[ 32.156240] ? ip4_datagram_release_cb+0x5f/0x1e0\n[ 32.156649] ? get_random_u16+0x69/0xf0\n[ 32.156989] ? __fget_light+0xcf/0x110\n[ 32.157326] __sys_sendmmsg+0xc4/0x210\n[ 32.157657] ? __sys_connect+0xb7/0xe0\n[ 32.157995] ? __audit_syscall_entry+0xce/0x140\n[ 32.158388] ? syscall_trace_enter.isra.0+0x12c/0x1a0\n[ 32.158820] __x64_sys_sendmmsg+0x24/0x30\n[ 32.159171] do_syscall_64+0x38/0x90\n[ 32.159493] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nFix that by reducing txq number as the non-existent primary-dev does.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54236",
"url": "https://www.suse.com/security/cve/CVE-2023-54236"
},
{
"category": "external",
"summary": "SUSE Bug 1255922 for CVE-2023-54236",
"url": "https://bugzilla.suse.com/1255922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54236"
},
{
"cve": "CVE-2023-54260",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54260"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix lost destroy smbd connection when MR allocate failed\n\nIf the MR allocate failed, the smb direct connection info is NULL,\nthen smbd_destroy() will directly return, then the connection info\nwill be leaked.\n\nLet\u0027s set the smb direct connection info to the server before call\nsmbd_destroy().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54260",
"url": "https://www.suse.com/security/cve/CVE-2023-54260"
},
{
"category": "external",
"summary": "SUSE Bug 1255878 for CVE-2023-54260",
"url": "https://bugzilla.suse.com/1255878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54260"
},
{
"cve": "CVE-2023-54264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54264"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/sysv: Null check to prevent null-ptr-deref bug\n\nsb_getblk(inode-\u003ei_sb, parent) return a null ptr and taking lock on\nthat leads to the null-ptr-deref bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54264",
"url": "https://www.suse.com/security/cve/CVE-2023-54264"
},
{
"category": "external",
"summary": "SUSE Bug 1255872 for CVE-2023-54264",
"url": "https://bugzilla.suse.com/1255872"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54264"
},
{
"cve": "CVE-2023-54266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54266"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer()\n\n\u0027read\u0027 is freed when it is known to be NULL, but not when a read error\noccurs.\n\nRevert the logic to avoid a small leak, should a m920x_read() call fail.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54266",
"url": "https://www.suse.com/security/cve/CVE-2023-54266"
},
{
"category": "external",
"summary": "SUSE Bug 1255875 for CVE-2023-54266",
"url": "https://bugzilla.suse.com/1255875"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54266"
},
{
"cve": "CVE-2023-54270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54270"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: usb: siano: Fix use after free bugs caused by do_submit_urb\n\nThere are UAF bugs caused by do_submit_urb(). One of the KASan reports\nis shown below:\n\n[ 36.403605] BUG: KASAN: use-after-free in worker_thread+0x4a2/0x890\n[ 36.406105] Read of size 8 at addr ffff8880059600e8 by task kworker/0:2/49\n[ 36.408316]\n[ 36.408867] CPU: 0 PID: 49 Comm: kworker/0:2 Not tainted 6.2.0-rc3-15798-g5a41237ad1d4-dir8\n[ 36.411696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g15584\n[ 36.416157] Workqueue: 0x0 (events)\n[ 36.417654] Call Trace:\n[ 36.418546] \u003cTASK\u003e\n[ 36.419320] dump_stack_lvl+0x96/0xd0\n[ 36.420522] print_address_description+0x75/0x350\n[ 36.421992] print_report+0x11b/0x250\n[ 36.423174] ? _raw_spin_lock_irqsave+0x87/0xd0\n[ 36.424806] ? __virt_addr_valid+0xcf/0x170\n[ 36.426069] ? worker_thread+0x4a2/0x890\n[ 36.427355] kasan_report+0x131/0x160\n[ 36.428556] ? worker_thread+0x4a2/0x890\n[ 36.430053] worker_thread+0x4a2/0x890\n[ 36.431297] ? worker_clr_flags+0x90/0x90\n[ 36.432479] kthread+0x166/0x190\n[ 36.433493] ? kthread_blkcg+0x50/0x50\n[ 36.434669] ret_from_fork+0x22/0x30\n[ 36.435923] \u003c/TASK\u003e\n[ 36.436684]\n[ 36.437215] Allocated by task 24:\n[ 36.438289] kasan_set_track+0x50/0x80\n[ 36.439436] __kasan_kmalloc+0x89/0xa0\n[ 36.440566] smsusb_probe+0x374/0xc90\n[ 36.441920] usb_probe_interface+0x2d1/0x4c0\n[ 36.443253] really_probe+0x1d5/0x580\n[ 36.444539] __driver_probe_device+0xe3/0x130\n[ 36.446085] driver_probe_device+0x49/0x220\n[ 36.447423] __device_attach_driver+0x19e/0x1b0\n[ 36.448931] bus_for_each_drv+0xcb/0x110\n[ 36.450217] __device_attach+0x132/0x1f0\n[ 36.451470] bus_probe_device+0x59/0xf0\n[ 36.452563] device_add+0x4ec/0x7b0\n[ 36.453830] usb_set_configuration+0xc63/0xe10\n[ 36.455230] usb_generic_driver_probe+0x3b/0x80\n[ 36.456166] printk: console [ttyGS0] disabled\n[ 36.456569] usb_probe_device+0x90/0x110\n[ 36.459523] really_probe+0x1d5/0x580\n[ 36.461027] __driver_probe_device+0xe3/0x130\n[ 36.462465] driver_probe_device+0x49/0x220\n[ 36.463847] __device_attach_driver+0x19e/0x1b0\n[ 36.465229] bus_for_each_drv+0xcb/0x110\n[ 36.466466] __device_attach+0x132/0x1f0\n[ 36.467799] bus_probe_device+0x59/0xf0\n[ 36.469010] device_add+0x4ec/0x7b0\n[ 36.470125] usb_new_device+0x863/0xa00\n[ 36.471374] hub_event+0x18c7/0x2220\n[ 36.472746] process_one_work+0x34c/0x5b0\n[ 36.474041] worker_thread+0x4b7/0x890\n[ 36.475216] kthread+0x166/0x190\n[ 36.476267] ret_from_fork+0x22/0x30\n[ 36.477447]\n[ 36.478160] Freed by task 24:\n[ 36.479239] kasan_set_track+0x50/0x80\n[ 36.480512] kasan_save_free_info+0x2b/0x40\n[ 36.481808] ____kasan_slab_free+0x122/0x1a0\n[ 36.483173] __kmem_cache_free+0xc4/0x200\n[ 36.484563] smsusb_term_device+0xcd/0xf0\n[ 36.485896] smsusb_probe+0xc85/0xc90\n[ 36.486976] usb_probe_interface+0x2d1/0x4c0\n[ 36.488303] really_probe+0x1d5/0x580\n[ 36.489498] __driver_probe_device+0xe3/0x130\n[ 36.491140] driver_probe_device+0x49/0x220\n[ 36.492475] __device_attach_driver+0x19e/0x1b0\n[ 36.493988] bus_for_each_drv+0xcb/0x110\n[ 36.495171] __device_attach+0x132/0x1f0\n[ 36.496617] bus_probe_device+0x59/0xf0\n[ 36.497875] device_add+0x4ec/0x7b0\n[ 36.498972] usb_set_configuration+0xc63/0xe10\n[ 36.500264] usb_generic_driver_probe+0x3b/0x80\n[ 36.501740] usb_probe_device+0x90/0x110\n[ 36.503084] really_probe+0x1d5/0x580\n[ 36.504241] __driver_probe_device+0xe3/0x130\n[ 36.505548] driver_probe_device+0x49/0x220\n[ 36.506766] __device_attach_driver+0x19e/0x1b0\n[ 36.508368] bus_for_each_drv+0xcb/0x110\n[ 36.509646] __device_attach+0x132/0x1f0\n[ 36.510911] bus_probe_device+0x59/0xf0\n[ 36.512103] device_add+0x4ec/0x7b0\n[ 36.513215] usb_new_device+0x863/0xa00\n[ 36.514736] hub_event+0x18c7/0x2220\n[ 36.516130] process_one_work+\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54270",
"url": "https://www.suse.com/security/cve/CVE-2023-54270"
},
{
"category": "external",
"summary": "SUSE Bug 1255901 for CVE-2023-54270",
"url": "https://bugzilla.suse.com/1255901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54270"
},
{
"cve": "CVE-2023-54271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54271"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init\n\nblk-iocost sometimes causes the following crash:\n\n BUG: kernel NULL pointer dereference, address: 00000000000000e0\n ...\n RIP: 0010:_raw_spin_lock+0x17/0x30\n Code: be 01 02 00 00 e8 79 38 39 ff 31 d2 89 d0 5d c3 0f 1f 00 0f 1f 44 00 00 55 48 89 e5 65 ff 05 48 d0 34 7e b9 01 00 00 00 31 c0 \u003cf0\u003e 0f b1 0f 75 02 5d c3 89 c6 e8 ea 04 00 00 5d c3 0f 1f 84 00 00\n RSP: 0018:ffffc900023b3d40 EFLAGS: 00010046\n RAX: 0000000000000000 RBX: 00000000000000e0 RCX: 0000000000000001\n RDX: ffffc900023b3d20 RSI: ffffc900023b3cf0 RDI: 00000000000000e0\n RBP: ffffc900023b3d40 R08: ffffc900023b3c10 R09: 0000000000000003\n R10: 0000000000000064 R11: 000000000000000a R12: ffff888102337000\n R13: fffffffffffffff2 R14: ffff88810af408c8 R15: ffff8881070c3600\n FS: 00007faaaf364fc0(0000) GS:ffff88842fdc0000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00000000000000e0 CR3: 00000001097b1000 CR4: 0000000000350ea0\n Call Trace:\n \u003cTASK\u003e\n ioc_weight_write+0x13d/0x410\n cgroup_file_write+0x7a/0x130\n kernfs_fop_write_iter+0xf5/0x170\n vfs_write+0x298/0x370\n ksys_write+0x5f/0xb0\n __x64_sys_write+0x1b/0x20\n do_syscall_64+0x3d/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis happens because iocg-\u003eioc is NULL. The field is initialized by\nioc_pd_init() and never cleared. The NULL deref is caused by\nblkcg_activate_policy() installing blkg_policy_data before initializing it.\n\nblkcg_activate_policy() was doing the following:\n\n1. Allocate pd\u0027s for all existing blkg\u0027s and install them in blkg-\u003epd[].\n2. Initialize all pd\u0027s.\n3. Online all pd\u0027s.\n\nblkcg_activate_policy() only grabs the queue_lock and may release and\nre-acquire the lock as allocation may need to sleep. ioc_weight_write()\ngrabs blkcg-\u003elock and iterates all its blkg\u0027s. The two can race and if\nioc_weight_write() runs during #1 or between #1 and #2, it can encounter a\npd which is not initialized yet, leading to crash.\n\nThe crash can be reproduced with the following script:\n\n #!/bin/bash\n\n echo +io \u003e /sys/fs/cgroup/cgroup.subtree_control\n systemd-run --unit touch-sda --scope dd if=/dev/sda of=/dev/null bs=1M count=1 iflag=direct\n echo 100 \u003e /sys/fs/cgroup/system.slice/io.weight\n bash -c \"echo \u00278:0 enable=1\u0027 \u003e /sys/fs/cgroup/io.cost.qos\" \u0026\n sleep .2\n echo 100 \u003e /sys/fs/cgroup/system.slice/io.weight\n\nwith the following patch applied:\n\n\u003e diff --git a/block/blk-cgroup.c b/block/blk-cgroup.c\n\u003e index fc49be622e05..38d671d5e10c 100644\n\u003e --- a/block/blk-cgroup.c\n\u003e +++ b/block/blk-cgroup.c\n\u003e @@ -1553,6 +1553,12 @@ int blkcg_activate_policy(struct gendisk *disk, const struct blkcg_policy *pol)\n\u003e \t\tpd-\u003eonline = false;\n\u003e \t}\n\u003e\n\u003e + if (system_state == SYSTEM_RUNNING) {\n\u003e + spin_unlock_irq(\u0026q-\u003equeue_lock);\n\u003e + ssleep(1);\n\u003e + spin_lock_irq(\u0026q-\u003equeue_lock);\n\u003e + }\n\u003e +\n\u003e \t/* all allocated, init in the same order */\n\u003e \tif (pol-\u003epd_init_fn)\n\u003e \t\tlist_for_each_entry_reverse(blkg, \u0026q-\u003eblkg_list, q_node)\n\nI don\u0027t see a reason why all pd\u0027s should be allocated, initialized and\nonlined together. The only ordering requirement is that parent blkgs to be\ninitialized and onlined before children, which is guaranteed from the\nwalking order. Let\u0027s fix the bug by allocating, initializing and onlining pd\nfor each blkg and holding blkcg-\u003elock over initialization and onlining. This\nensures that an installed blkg is always fully initialized and onlined\nremoving the the race window.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54271",
"url": "https://www.suse.com/security/cve/CVE-2023-54271"
},
{
"category": "external",
"summary": "SUSE Bug 1255902 for CVE-2023-54271",
"url": "https://bugzilla.suse.com/1255902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54271"
},
{
"cve": "CVE-2023-54286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54286"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace\n\nA received TKIP key may be up to 32 bytes because it may contain\nMIC rx/tx keys too. These are not used by iwl and copying these\nover overflows the iwl_keyinfo.key field.\n\nAdd a check to not copy more data to iwl_keyinfo.key then will fit.\n\nThis fixes backtraces like this one:\n\n memcpy: detected field-spanning write (size 32) of single field \"sta_cmd.key.key\" at drivers/net/wireless/intel/iwlwifi/dvm/sta.c:1103 (size 16)\n WARNING: CPU: 1 PID: 946 at drivers/net/wireless/intel/iwlwifi/dvm/sta.c:1103 iwlagn_send_sta_key+0x375/0x390 [iwldvm]\n \u003csnip\u003e\n Hardware name: Dell Inc. Latitude E6430/0H3MT5, BIOS A21 05/08/2017\n RIP: 0010:iwlagn_send_sta_key+0x375/0x390 [iwldvm]\n \u003csnip\u003e\n Call Trace:\n \u003cTASK\u003e\n iwl_set_dynamic_key+0x1f0/0x220 [iwldvm]\n iwlagn_mac_set_key+0x1e4/0x280 [iwldvm]\n drv_set_key+0xa4/0x1b0 [mac80211]\n ieee80211_key_enable_hw_accel+0xa8/0x2d0 [mac80211]\n ieee80211_key_replace+0x22d/0x8e0 [mac80211]\n \u003csnip\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54286",
"url": "https://www.suse.com/security/cve/CVE-2023-54286"
},
{
"category": "external",
"summary": "SUSE Bug 1255803 for CVE-2023-54286",
"url": "https://bugzilla.suse.com/1255803"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54286"
},
{
"cve": "CVE-2023-54289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54289"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Fix NULL dereference in error handling\n\nSmatch reported:\n\ndrivers/scsi/qedf/qedf_main.c:3056 qedf_alloc_global_queues()\nwarn: missing unwind goto?\n\nAt this point in the function, nothing has been allocated so we can return\ndirectly. In particular the \"qedf-\u003eglobal_queues\" have not been allocated\nso calling qedf_free_global_queues() will lead to a NULL dereference when\nwe check if (!gl[i]) and \"gl\" is NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54289",
"url": "https://www.suse.com/security/cve/CVE-2023-54289"
},
{
"category": "external",
"summary": "SUSE Bug 1255806 for CVE-2023-54289",
"url": "https://bugzilla.suse.com/1255806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54289"
},
{
"cve": "CVE-2023-54294",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54294"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid10: fix memleak of md thread\n\nIn raid10_run(), if setup_conf() succeed and raid10_run() failed before\nsetting \u0027mddev-\u003ethread\u0027, then in the error path \u0027conf-\u003ethread\u0027 is not\nfreed.\n\nFix the problem by setting \u0027mddev-\u003ethread\u0027 right after setup_conf().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54294",
"url": "https://www.suse.com/security/cve/CVE-2023-54294"
},
{
"category": "external",
"summary": "SUSE Bug 1255802 for CVE-2023-54294",
"url": "https://bugzilla.suse.com/1255802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54294"
},
{
"cve": "CVE-2023-54300",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54300"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx\n\nFor the reasons also described in commit b383e8abed41 (\"wifi: ath9k: avoid\nuninit memory read in ath9k_htc_rx_msg()\"), ath9k_htc_rx_msg() should\nvalidate pkt_len before accessing the SKB.\n\nFor example, the obtained SKB may have been badly constructed with\npkt_len = 8. In this case, the SKB can only contain a valid htc_frame_hdr\nbut after being processed in ath9k_htc_rx_msg() and passed to\nath9k_wmi_ctrl_rx() endpoint RX handler, it is expected to have a WMI\ncommand header which should be located inside its data payload.\n\nImplement sanity checking inside ath9k_wmi_ctrl_rx(). Otherwise, uninit\nmemory can be referenced.\n\nTested on Qualcomm Atheros Communications AR9271 802.11n .\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54300",
"url": "https://www.suse.com/security/cve/CVE-2023-54300"
},
{
"category": "external",
"summary": "SUSE Bug 1255790 for CVE-2023-54300",
"url": "https://bugzilla.suse.com/1255790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54300"
},
{
"cve": "CVE-2023-54309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54309"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation\n\n/dev/vtpmx is made visible before \u0027workqueue\u0027 is initialized, which can\nlead to a memory corruption in the worst case scenario.\n\nAddress this by initializing \u0027workqueue\u0027 as the very first step of the\ndriver initialization.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54309",
"url": "https://www.suse.com/security/cve/CVE-2023-54309"
},
{
"category": "external",
"summary": "SUSE Bug 1255780 for CVE-2023-54309",
"url": "https://bugzilla.suse.com/1255780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54309"
},
{
"cve": "CVE-2023-54317",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54317"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm flakey: don\u0027t corrupt the zero page\n\nWhen we need to zero some range on a block device, the function\n__blkdev_issue_zero_pages submits a write bio with the bio vector pointing\nto the zero page. If we use dm-flakey with corrupt bio writes option, it\nwill corrupt the content of the zero page which results in crashes of\nvarious userspace programs. Glibc assumes that memory returned by mmap is\nzeroed and it uses it for calloc implementation; if the newly mapped\nmemory is not zeroed, calloc will return non-zeroed memory.\n\nFix this bug by testing if the page is equal to ZERO_PAGE(0) and\navoiding the corruption in this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54317",
"url": "https://www.suse.com/security/cve/CVE-2023-54317"
},
{
"category": "external",
"summary": "SUSE Bug 1255771 for CVE-2023-54317",
"url": "https://bugzilla.suse.com/1255771"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2023-54317"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38336"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330\n\nThe controller has a hardware bug that can hard hang the system when\ndoing ATAPI DMAs without any trace of what happened. Depending on the\ndevice attached, it can also prevent the system from booting.\n\nIn this case, the system hangs when reading the ATIP from optical media\nwith cdrecord -vvv -atip on an _NEC DVD_RW ND-4571A 1-01 and an\nOptiarc DVD RW AD-7200A 1.06 attached to an ASRock 990FX Extreme 4,\nrunning at UDMA/33.\n\nThe issue can be reproduced by running the same command with a cygwin\nbuild of cdrecord on WinXP, although it requires more attempts to cause\nit. The hang in that case is also resolved by forcing PIO. It doesn\u0027t\nappear that VIA has produced any drivers for that OS, thus no known\nworkaround exists.\n\nHDDs attached to the controller do not suffer from any DMA issues.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38336",
"url": "https://www.suse.com/security/cve/CVE-2025-38336"
},
{
"category": "external",
"summary": "SUSE Bug 1246370 for CVE-2025-38336",
"url": "https://bugzilla.suse.com/1246370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-38336"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40035"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak\n\nStruct ff_effect_compat is embedded twice inside\nuinput_ff_upload_compat, contains internal padding. In particular, there\nis a hole after struct ff_replay to satisfy alignment requirements for\nthe following union member. Without clearing the structure,\ncopy_to_user() may leak stack data to userspace.\n\nInitialize ff_up_compat to zero before filling valid fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40035",
"url": "https://www.suse.com/security/cve/CVE-2025-40035"
},
{
"category": "external",
"summary": "SUSE Bug 1252866 for CVE-2025-40035",
"url": "https://bugzilla.suse.com/1252866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40035"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40123"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Enforce expected_attach_type for tailcall compatibility\n\nYinhao et al. recently reported:\n\n Our fuzzer tool discovered an uninitialized pointer issue in the\n bpf_prog_test_run_xdp() function within the Linux kernel\u0027s BPF subsystem.\n This leads to a NULL pointer dereference when a BPF program attempts to\n deference the txq member of struct xdp_buff object.\n\nThe test initializes two programs of BPF_PROG_TYPE_XDP: progA acts as the\nentry point for bpf_prog_test_run_xdp() and its expected_attach_type can\nneither be of be BPF_XDP_DEVMAP nor BPF_XDP_CPUMAP. progA calls into a slot\nof a tailcall map it owns. progB\u0027s expected_attach_type must be BPF_XDP_DEVMAP\nto pass xdp_is_valid_access() validation. The program returns struct xdp_md\u0027s\negress_ifindex, and the latter is only allowed to be accessed under mentioned\nexpected_attach_type. progB is then inserted into the tailcall which progA\ncalls.\n\nThe underlying issue goes beyond XDP though. Another example are programs\nof type BPF_PROG_TYPE_CGROUP_SOCK_ADDR. sock_addr_is_valid_access() as well\nas sock_addr_func_proto() have different logic depending on the programs\u0027\nexpected_attach_type. Similarly, a program attached to BPF_CGROUP_INET4_GETPEERNAME\nshould not be allowed doing a tailcall into a program which calls bpf_bind()\nout of BPF which is only enabled for BPF_CGROUP_INET4_CONNECT.\n\nIn short, specifying expected_attach_type allows to open up additional\nfunctionality or restrictions beyond what the basic bpf_prog_type enables.\nThe use of tailcalls must not violate these constraints. Fix it by enforcing\nexpected_attach_type in __bpf_prog_map_compatible().\n\nNote that we only enforce this for tailcall maps, but not for BPF devmaps or\ncpumaps: There, the programs are invoked through dev_map_bpf_prog_run*() and\ncpu_map_bpf_prog_run*() which set up a new environment / context and therefore\nthese situations are not prone to this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40123",
"url": "https://www.suse.com/security/cve/CVE-2025-40123"
},
{
"category": "external",
"summary": "SUSE Bug 1253365 for CVE-2025-40123",
"url": "https://bugzilla.suse.com/1253365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40123"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40160"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/events: Return -EEXIST for bound VIRQs\n\nChange find_virq() to return -EEXIST when a VIRQ is bound to a\ndifferent CPU than the one passed in. With that, remove the BUG_ON()\nfrom bind_virq_to_irq() to propogate the error upwards.\n\nSome VIRQs are per-cpu, but others are per-domain or global. Those must\nbe bound to CPU0 and can then migrate elsewhere. The lookup for\nper-domain and global will probably fail when migrated off CPU 0,\nespecially when the current CPU is tracked. This now returns -EEXIST\ninstead of BUG_ON().\n\nA second call to bind a per-domain or global VIRQ is not expected, but\nmake it non-fatal to avoid trying to look up the irq, since we don\u0027t\nknow which per_cpu(virq_to_irq) it will be in.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40160",
"url": "https://www.suse.com/security/cve/CVE-2025-40160"
},
{
"category": "external",
"summary": "SUSE Bug 1253400 for CVE-2025-40160",
"url": "https://bugzilla.suse.com/1253400"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "low"
}
],
"title": "CVE-2025-40160"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40167"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: detect invalid INLINE_DATA + EXTENTS flag combination\n\nsyzbot reported a BUG_ON in ext4_es_cache_extent() when opening a verity\nfile on a corrupted ext4 filesystem mounted without a journal.\n\nThe issue is that the filesystem has an inode with both the INLINE_DATA\nand EXTENTS flags set:\n\n EXT4-fs error (device loop0): ext4_cache_extents:545: inode #15:\n comm syz.0.17: corrupted extent tree: lblk 0 \u003c prev 66\n\nInvestigation revealed that the inode has both flags set:\n DEBUG: inode 15 - flag=1, i_inline_off=164, has_inline=1, extents_flag=1\n\nThis is an invalid combination since an inode should have either:\n- INLINE_DATA: data stored directly in the inode\n- EXTENTS: data stored in extent-mapped blocks\n\nHaving both flags causes ext4_has_inline_data() to return true, skipping\nextent tree validation in __ext4_iget(). The unvalidated out-of-order\nextents then trigger a BUG_ON in ext4_es_cache_extent() due to integer\nunderflow when calculating hole sizes.\n\nFix this by detecting this invalid flag combination early in ext4_iget()\nand rejecting the corrupted inode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40167",
"url": "https://www.suse.com/security/cve/CVE-2025-40167"
},
{
"category": "external",
"summary": "SUSE Bug 1253458 for CVE-2025-40167",
"url": "https://bugzilla.suse.com/1253458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40167"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40170"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: use dst_dev_rcu() in sk_setup_caps()\n\nUse RCU to protect accesses to dst-\u003edev from sk_setup_caps()\nand sk_dst_gso_max_size().\n\nAlso use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(),\nand ip_dst_mtu_maybe_forward().\n\nip4_dst_hoplimit() can use dst_dev_net_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40170",
"url": "https://www.suse.com/security/cve/CVE-2025-40170"
},
{
"category": "external",
"summary": "SUSE Bug 1253413 for CVE-2025-40170",
"url": "https://bugzilla.suse.com/1253413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40170"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40215"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: delete x-\u003etunnel as we delete x\n\nThe ipcomp fallback tunnels currently get deleted (from the various\nlists and hashtables) as the last user state that needed that fallback\nis destroyed (not deleted). If a reference to that user state still\nexists, the fallback state will remain on the hashtables/lists,\ntriggering the WARN in xfrm_state_fini. Because of those remaining\nreferences, the fix in commit f75a2804da39 (\"xfrm: destroy xfrm_state\nsynchronously on net exit path\") is not complete.\n\nWe recently fixed one such situation in TCP due to defered freeing of\nskbs (commit 9b6412e6979f (\"tcp: drop secpath at the same time as we\ncurrently drop dst\")). This can also happen due to IP reassembly: skbs\nwith a secpath remain on the reassembly queue until netns\ndestruction. If we can\u0027t guarantee that the queues are flushed by the\ntime xfrm_state_fini runs, there may still be references to a (user)\nxfrm_state, preventing the timely deletion of the corresponding\nfallback state.\n\nInstead of chasing each instance of skbs holding a secpath one by one,\nthis patch fixes the issue directly within xfrm, by deleting the\nfallback state as soon as the last user state depending on it has been\ndeleted. Destruction will still happen when the final reference is\ndropped.\n\nA separate lockdep class for the fallback state is required since\nwe\u0027re going to lock x-\u003etunnel while x is locked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40215",
"url": "https://www.suse.com/security/cve/CVE-2025-40215"
},
{
"category": "external",
"summary": "SUSE Bug 1254959 for CVE-2025-40215",
"url": "https://bugzilla.suse.com/1254959"
},
{
"category": "external",
"summary": "SUSE Bug 1255054 for CVE-2025-40215",
"url": "https://bugzilla.suse.com/1255054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "important"
}
],
"title": "CVE-2025-40215"
},
{
"cve": "CVE-2025-40219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40219"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV\n\nBefore disabling SR-IOV via config space accesses to the parent PF,\nsriov_disable() first removes the PCI devices representing the VFs.\n\nSince commit 9d16947b7583 (\"PCI: Add global pci_lock_rescan_remove()\")\nsuch removal operations are serialized against concurrent remove and\nrescan using the pci_rescan_remove_lock. No such locking was ever added\nin sriov_disable() however. In particular when commit 18f9e9d150fc\n(\"PCI/IOV: Factor out sriov_add_vfs()\") factored out the PCI device\nremoval into sriov_del_vfs() there was still no locking around the\npci_iov_remove_virtfn() calls.\n\nOn s390 the lack of serialization in sriov_disable() may cause double\nremove and list corruption with the below (amended) trace being observed:\n\n PSW: 0704c00180000000 0000000c914e4b38 (klist_put+56)\n GPRS: 000003800313fb48 0000000000000000 0000000100000001 0000000000000001\n\t00000000f9b520a8 0000000000000000 0000000000002fbd 00000000f4cc9480\n\t0000000000000001 0000000000000000 0000000000000000 0000000180692828\n\t00000000818e8000 000003800313fe2c 000003800313fb20 000003800313fad8\n #0 [3800313fb20] device_del at c9158ad5c\n #1 [3800313fb88] pci_remove_bus_device at c915105ba\n #2 [3800313fbd0] pci_iov_remove_virtfn at c9152f198\n #3 [3800313fc28] zpci_iov_remove_virtfn at c90fb67c0\n #4 [3800313fc60] zpci_bus_remove_device at c90fb6104\n #5 [3800313fca0] __zpci_event_availability at c90fb3dca\n #6 [3800313fd08] chsc_process_sei_nt0 at c918fe4a2\n #7 [3800313fd60] crw_collect_info at c91905822\n #8 [3800313fe10] kthread at c90feb390\n #9 [3800313fe68] __ret_from_fork at c90f6aa64\n #10 [3800313fe98] ret_from_fork at c9194f3f2.\n\nThis is because in addition to sriov_disable() removing the VFs, the\nplatform also generates hot-unplug events for the VFs. This being the\nreverse operation to the hotplug events generated by sriov_enable() and\nhandled via pdev-\u003eno_vf_scan. And while the event processing takes\npci_rescan_remove_lock and checks whether the struct pci_dev still exists,\nthe lack of synchronization makes this checking racy.\n\nOther races may also be possible of course though given that this lack of\nlocking persisted so long observable races seem very rare. Even on s390 the\nlist corruption was only observed with certain devices since the platform\nevents are only triggered by config accesses after the removal, so as long\nas the removal finished synchronously they would not race. Either way the\nlocking is missing so fix this by adding it to the sriov_del_vfs() helper.\n\nJust like PCI rescan-remove, locking is also missing in sriov_add_vfs()\nincluding for the error case where pci_stop_and_remove_bus_device() is\ncalled without the PCI rescan-remove lock being held. Even in the non-error\ncase, adding new PCI devices and buses should be serialized via the PCI\nrescan-remove lock. Add the necessary locking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40219",
"url": "https://www.suse.com/security/cve/CVE-2025-40219"
},
{
"category": "external",
"summary": "SUSE Bug 1254518 for CVE-2025-40219",
"url": "https://bugzilla.suse.com/1254518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40219"
},
{
"cve": "CVE-2025-40233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40233"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: clear extent cache after moving/defragmenting extents\n\nThe extent map cache can become stale when extents are moved or\ndefragmented, causing subsequent operations to see outdated extent flags. \nThis triggers a BUG_ON in ocfs2_refcount_cal_cow_clusters().\n\nThe problem occurs when:\n1. copy_file_range() creates a reflinked extent with OCFS2_EXT_REFCOUNTED\n2. ioctl(FITRIM) triggers ocfs2_move_extents()\n3. __ocfs2_move_extents_range() reads and caches the extent (flags=0x2)\n4. ocfs2_move_extent()/ocfs2_defrag_extent() calls __ocfs2_move_extent()\n which clears OCFS2_EXT_REFCOUNTED flag on disk (flags=0x0)\n5. The extent map cache is not invalidated after the move\n6. Later write() operations read stale cached flags (0x2) but disk has\n updated flags (0x0), causing a mismatch\n7. BUG_ON(!(rec-\u003ee_flags \u0026 OCFS2_EXT_REFCOUNTED)) triggers\n\nFix by clearing the extent map cache after each extent move/defrag\noperation in __ocfs2_move_extents_range(). This ensures subsequent\noperations read fresh extent data from disk.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40233",
"url": "https://www.suse.com/security/cve/CVE-2025-40233"
},
{
"category": "external",
"summary": "SUSE Bug 1254813 for CVE-2025-40233",
"url": "https://bugzilla.suse.com/1254813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40233"
},
{
"cve": "CVE-2025-40240",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40240"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: avoid NULL dereference when chunk data buffer is missing\n\nchunk-\u003eskb pointer is dereferenced in the if-block where it\u0027s supposed\nto be NULL only.\n\nchunk-\u003eskb can only be NULL if chunk-\u003ehead_skb is not. Check for frag_list\ninstead and do it just before replacing chunk-\u003eskb. We\u0027re sure that\notherwise chunk-\u003eskb is non-NULL because of outer if() condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40240",
"url": "https://www.suse.com/security/cve/CVE-2025-40240"
},
{
"category": "external",
"summary": "SUSE Bug 1254869 for CVE-2025-40240",
"url": "https://bugzilla.suse.com/1254869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40240"
},
{
"cve": "CVE-2025-40244",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40244"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()\n\nThe syzbot reported issue in __hfsplus_ext_cache_extent():\n\n[ 70.194323][ T9350] BUG: KMSAN: uninit-value in __hfsplus_ext_cache_extent+0x7d0/0x990\n[ 70.195022][ T9350] __hfsplus_ext_cache_extent+0x7d0/0x990\n[ 70.195530][ T9350] hfsplus_file_extend+0x74f/0x1cf0\n[ 70.195998][ T9350] hfsplus_get_block+0xe16/0x17b0\n[ 70.196458][ T9350] __block_write_begin_int+0x962/0x2ce0\n[ 70.196959][ T9350] cont_write_begin+0x1000/0x1950\n[ 70.197416][ T9350] hfsplus_write_begin+0x85/0x130\n[ 70.197873][ T9350] generic_perform_write+0x3e8/0x1060\n[ 70.198374][ T9350] __generic_file_write_iter+0x215/0x460\n[ 70.198892][ T9350] generic_file_write_iter+0x109/0x5e0\n[ 70.199393][ T9350] vfs_write+0xb0f/0x14e0\n[ 70.199771][ T9350] ksys_write+0x23e/0x490\n[ 70.200149][ T9350] __x64_sys_write+0x97/0xf0\n[ 70.200570][ T9350] x64_sys_call+0x3015/0x3cf0\n[ 70.201065][ T9350] do_syscall_64+0xd9/0x1d0\n[ 70.201506][ T9350] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 70.202054][ T9350]\n[ 70.202279][ T9350] Uninit was created at:\n[ 70.202693][ T9350] __kmalloc_noprof+0x621/0xf80\n[ 70.203149][ T9350] hfsplus_find_init+0x8d/0x1d0\n[ 70.203602][ T9350] hfsplus_file_extend+0x6ca/0x1cf0\n[ 70.204087][ T9350] hfsplus_get_block+0xe16/0x17b0\n[ 70.204561][ T9350] __block_write_begin_int+0x962/0x2ce0\n[ 70.205074][ T9350] cont_write_begin+0x1000/0x1950\n[ 70.205547][ T9350] hfsplus_write_begin+0x85/0x130\n[ 70.206017][ T9350] generic_perform_write+0x3e8/0x1060\n[ 70.206519][ T9350] __generic_file_write_iter+0x215/0x460\n[ 70.207042][ T9350] generic_file_write_iter+0x109/0x5e0\n[ 70.207552][ T9350] vfs_write+0xb0f/0x14e0\n[ 70.207961][ T9350] ksys_write+0x23e/0x490\n[ 70.208375][ T9350] __x64_sys_write+0x97/0xf0\n[ 70.208810][ T9350] x64_sys_call+0x3015/0x3cf0\n[ 70.209255][ T9350] do_syscall_64+0xd9/0x1d0\n[ 70.209680][ T9350] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 70.210230][ T9350]\n[ 70.210454][ T9350] CPU: 2 UID: 0 PID: 9350 Comm: repro Not tainted 6.12.0-rc5 #5\n[ 70.211174][ T9350] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 70.212115][ T9350] =====================================================\n[ 70.212734][ T9350] Disabling lock debugging due to kernel taint\n[ 70.213284][ T9350] Kernel panic - not syncing: kmsan.panic set ...\n[ 70.213858][ T9350] CPU: 2 UID: 0 PID: 9350 Comm: repro Tainted: G B 6.12.0-rc5 #5\n[ 70.214679][ T9350] Tainted: [B]=BAD_PAGE\n[ 70.215057][ T9350] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 70.215999][ T9350] Call Trace:\n[ 70.216309][ T9350] \u003cTASK\u003e\n[ 70.216585][ T9350] dump_stack_lvl+0x1fd/0x2b0\n[ 70.217025][ T9350] dump_stack+0x1e/0x30\n[ 70.217421][ T9350] panic+0x502/0xca0\n[ 70.217803][ T9350] ? kmsan_get_metadata+0x13e/0x1c0\n\n[ 70.218294][ Message fromT sy9350] kmsan_report+0x296/slogd@syzkaller 0x2aat Aug 18 22:11:058 ...\n kernel\n:[ 70.213284][ T9350] Kernel panic - not syncing: kmsan.panic [ 70.220179][ T9350] ? kmsan_get_metadata+0x13e/0x1c0\nset ...\n[ 70.221254][ T9350] ? __msan_warning+0x96/0x120\n[ 70.222066][ T9350] ? __hfsplus_ext_cache_extent+0x7d0/0x990\n[ 70.223023][ T9350] ? hfsplus_file_extend+0x74f/0x1cf0\n[ 70.224120][ T9350] ? hfsplus_get_block+0xe16/0x17b0\n[ 70.224946][ T9350] ? __block_write_begin_int+0x962/0x2ce0\n[ 70.225756][ T9350] ? cont_write_begin+0x1000/0x1950\n[ 70.226337][ T9350] ? hfsplus_write_begin+0x85/0x130\n[ 70.226852][ T9350] ? generic_perform_write+0x3e8/0x1060\n[ 70.227405][ T9350] ? __generic_file_write_iter+0x215/0x460\n[ 70.227979][ T9350] ? generic_file_write_iter+0x109/0x5e0\n[ 70.228540][ T9350] ? vfs_write+0xb0f/0x14e0\n[ 70.228997][ T9350] ? ksys_write+0x23e/0x490\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40244",
"url": "https://www.suse.com/security/cve/CVE-2025-40244"
},
{
"category": "external",
"summary": "SUSE Bug 1255033 for CVE-2025-40244",
"url": "https://bugzilla.suse.com/1255033"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40244"
},
{
"cve": "CVE-2025-40248",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40248"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Ignore signal/timeout on connect() if already established\n\nDuring connect(), acting on a signal/timeout by disconnecting an already\nestablished socket leads to several issues:\n\n1. connect() invoking vsock_transport_cancel_pkt() -\u003e\n virtio_transport_purge_skbs() may race with sendmsg() invoking\n virtio_transport_get_credit(). This results in a permanently elevated\n `vvs-\u003ebytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling.\n\n2. connect() resetting a connected socket\u0027s state may race with socket\n being placed in a sockmap. A disconnected socket remaining in a sockmap\n breaks sockmap\u0027s assumptions. And gives rise to WARNs.\n\n3. connect() transitioning SS_CONNECTED -\u003e SS_UNCONNECTED allows for a\n transport change/drop after TCP_ESTABLISHED. Which poses a problem for\n any simultaneous sendmsg() or connect() and may result in a\n use-after-free/null-ptr-deref.\n\nDo not disconnect socket on signal/timeout. Keep the logic for unconnected\nsockets: they don\u0027t linger, can\u0027t be placed in a sockmap, are rejected by\nsendmsg().\n\n[1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox.co/\n[2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8837f3f1d4@rbox.co/\n[3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox.co/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40248",
"url": "https://www.suse.com/security/cve/CVE-2025-40248"
},
{
"category": "external",
"summary": "SUSE Bug 1254864 for CVE-2025-40248",
"url": "https://bugzilla.suse.com/1254864"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40248"
},
{
"cve": "CVE-2025-40252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40252"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()\n\nThe loops in \u0027qede_tpa_cont()\u0027 and \u0027qede_tpa_end()\u0027, iterate\nover \u0027cqe-\u003elen_list[]\u0027 using only a zero-length terminator as\nthe stopping condition. If the terminator was missing or\nmalformed, the loop could run past the end of the fixed-size array.\n\nAdd an explicit bound check using ARRAY_SIZE() in both loops to prevent\na potential out-of-bounds access.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40252",
"url": "https://www.suse.com/security/cve/CVE-2025-40252"
},
{
"category": "external",
"summary": "SUSE Bug 1254849 for CVE-2025-40252",
"url": "https://bugzilla.suse.com/1254849"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40252"
},
{
"cve": "CVE-2025-40256",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40256"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added\n\nIn commit b441cf3f8c4b (\"xfrm: delete x-\u003etunnel as we delete x\"), I\nmissed the case where state creation fails between full\ninitialization (-\u003einit_state has been called) and being inserted on\nthe lists.\n\nIn this situation, -\u003einit_state has been called, so for IPcomp\ntunnels, the fallback tunnel has been created and added onto the\nlists, but the user state never gets added, because we fail before\nthat. The user state doesn\u0027t go through __xfrm_state_delete, so we\ndon\u0027t call xfrm_state_delete_tunnel for those states, and we end up\nleaking the FB tunnel.\n\nThere are several codepaths affected by this: the add/update paths, in\nboth net/key and xfrm, and the migrate code (xfrm_migrate,\nxfrm_state_migrate). A \"proper\" rollback of the init_state work would\nprobably be doable in the add/update code, but for migrate it gets\nmore complicated as multiple states may be involved.\n\nAt some point, the new (not-inserted) state will be destroyed, so call\nxfrm_state_delete_tunnel during xfrm_state_gc_destroy. Most states\nwill have their fallback tunnel cleaned up during __xfrm_state_delete,\nwhich solves the issue that b441cf3f8c4b (and other patches before it)\naimed at. All states (including FB tunnels) will be removed from the\nlists once xfrm_state_fini has called flush_work(\u0026xfrm_state_gc_work).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40256",
"url": "https://www.suse.com/security/cve/CVE-2025-40256"
},
{
"category": "external",
"summary": "SUSE Bug 1254851 for CVE-2025-40256",
"url": "https://bugzilla.suse.com/1254851"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40256"
},
{
"cve": "CVE-2025-40269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40269"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix potential overflow of PCM transfer buffer\n\nThe PCM stream data in USB-audio driver is transferred over USB URB\npacket buffers, and each packet size is determined dynamically. The\npacket sizes are limited by some factors such as wMaxPacketSize USB\ndescriptor. OTOH, in the current code, the actually used packet sizes\nare determined only by the rate and the PPS, which may be bigger than\nthe size limit above. This results in a buffer overflow, as reported\nby syzbot.\n\nBasically when the limit is smaller than the calculated packet size,\nit implies that something is wrong, most likely a weird USB\ndescriptor. So the best option would be just to return an error at\nthe parameter setup time before doing any further operations.\n\nThis patch introduces such a sanity check, and returns -EINVAL when\nthe packet size is greater than maxpacksize. The comparison with\nep-\u003epacksize[1] alone should suffice since it\u0027s always equal or\ngreater than ep-\u003epacksize[0].",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40269",
"url": "https://www.suse.com/security/cve/CVE-2025-40269"
},
{
"category": "external",
"summary": "SUSE Bug 1255035 for CVE-2025-40269",
"url": "https://bugzilla.suse.com/1255035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40269"
},
{
"cve": "CVE-2025-40275",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40275"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd\n\nIn snd_usb_create_streams(), for UAC version 3 devices, the Interface\nAssociation Descriptor (IAD) is retrieved via usb_ifnum_to_if(). If this\ncall fails, a fallback routine attempts to obtain the IAD from the next\ninterface and sets a BADD profile. However, snd_usb_mixer_controls_badd()\nassumes that the IAD retrieved from usb_ifnum_to_if() is always valid,\nwithout performing a NULL check. This can lead to a NULL pointer\ndereference when usb_ifnum_to_if() fails to find the interface descriptor.\n\nThis patch adds a NULL pointer check after calling usb_ifnum_to_if() in\nsnd_usb_mixer_controls_badd() to prevent the dereference.\n\nThis issue was discovered by syzkaller, which triggered the bug by sending\na crafted USB device descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40275",
"url": "https://www.suse.com/security/cve/CVE-2025-40275"
},
{
"category": "external",
"summary": "SUSE Bug 1254829 for CVE-2025-40275",
"url": "https://bugzilla.suse.com/1254829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40275"
},
{
"cve": "CVE-2025-40278",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40278"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak\n\nFix a KMSAN kernel-infoleak detected by the syzbot .\n\n[net?] KMSAN: kernel-infoleak in __skb_datagram_iter\n\nIn tcf_ife_dump(), the variable \u0027opt\u0027 was partially initialized using a\ndesignatied initializer. While the padding bytes are reamined\nuninitialized. nla_put() copies the entire structure into a\nnetlink message, these uninitialized bytes leaked to userspace.\n\nInitialize the structure with memset before assigning its fields\nto ensure all members and padding are cleared prior to beign copied.\n\nThis change silences the KMSAN report and prevents potential information\nleaks from the kernel memory.\n\nThis fix has been tested and validated by syzbot. This patch closes the\nbug reported at the following syzkaller link and ensures no infoleak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40278",
"url": "https://www.suse.com/security/cve/CVE-2025-40278"
},
{
"category": "external",
"summary": "SUSE Bug 1254825 for CVE-2025-40278",
"url": "https://bugzilla.suse.com/1254825"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40278"
},
{
"cve": "CVE-2025-40279",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40279"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: act_connmark: initialize struct tc_ife to fix kernel leak\n\nIn tcf_connmark_dump(), the variable \u0027opt\u0027 was partially initialized using a\ndesignatied initializer. While the padding bytes are reamined\nuninitialized. nla_put() copies the entire structure into a\nnetlink message, these uninitialized bytes leaked to userspace.\n\nInitialize the structure with memset before assigning its fields\nto ensure all members and padding are cleared prior to beign copied.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40279",
"url": "https://www.suse.com/security/cve/CVE-2025-40279"
},
{
"category": "external",
"summary": "SUSE Bug 1254846 for CVE-2025-40279",
"url": "https://bugzilla.suse.com/1254846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40279"
},
{
"cve": "CVE-2025-40283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40283"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF\n\nThere is a KASAN: slab-use-after-free read in btusb_disconnect().\nCalling \"usb_driver_release_interface(\u0026btusb_driver, data-\u003eintf)\" will\nfree the btusb data associated with the interface. The same data is\nthen used later in the function, hence the UAF.\n\nFix by moving the accesses to btusb data to before the data is free\u0027d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40283",
"url": "https://www.suse.com/security/cve/CVE-2025-40283"
},
{
"category": "external",
"summary": "SUSE Bug 1254858 for CVE-2025-40283",
"url": "https://bugzilla.suse.com/1254858"
},
{
"category": "external",
"summary": "SUSE Bug 1254859 for CVE-2025-40283",
"url": "https://bugzilla.suse.com/1254859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40283"
},
{
"cve": "CVE-2025-40304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40304"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds\n\nAdd bounds checking to prevent writes past framebuffer boundaries when\nrendering text near screen edges. Return early if the Y position is off-screen\nand clip image height to screen boundary. Break from the rendering loop if the\nX position is off-screen. When clipping image width to fit the screen, update\nthe character count to match the clipped width to prevent buffer size\nmismatches.\n\nWithout the character count update, bit_putcs_aligned and bit_putcs_unaligned\nreceive mismatched parameters where the buffer is allocated for the clipped\nwidth but cnt reflects the original larger count, causing out-of-bounds writes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40304",
"url": "https://www.suse.com/security/cve/CVE-2025-40304"
},
{
"category": "external",
"summary": "SUSE Bug 1255034 for CVE-2025-40304",
"url": "https://bugzilla.suse.com/1255034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40304"
},
{
"cve": "CVE-2025-40308",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40308"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: bcsp: receive data only if registered\n\nCurrently, bcsp_recv() can be called even when the BCSP protocol has not\nbeen registered. This leads to a NULL pointer dereference, as shown in\nthe following stack trace:\n\n KASAN: null-ptr-deref in range [0x0000000000000108-0x000000000000010f]\n RIP: 0010:bcsp_recv+0x13d/0x1740 drivers/bluetooth/hci_bcsp.c:590\n Call Trace:\n \u003cTASK\u003e\n hci_uart_tty_receive+0x194/0x220 drivers/bluetooth/hci_ldisc.c:627\n tiocsti+0x23c/0x2c0 drivers/tty/tty_io.c:2290\n tty_ioctl+0x626/0xde0 drivers/tty/tty_io.c:2706\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nTo prevent this, ensure that the HCI_UART_REGISTERED flag is set before\nprocessing received data. If the protocol is not registered, return\n-EUNATCH.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40308",
"url": "https://www.suse.com/security/cve/CVE-2025-40308"
},
{
"category": "external",
"summary": "SUSE Bug 1255064 for CVE-2025-40308",
"url": "https://bugzilla.suse.com/1255064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40308"
},
{
"cve": "CVE-2025-40321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode\n\nCurrently, whenever there is a need to transmit an Action frame,\nthe brcmfmac driver always uses the P2P vif to send the \"actframe\" IOVAR to\nfirmware. The P2P interfaces were available when wpa_supplicant is managing\nthe wlan interface.\n\nHowever, the P2P interfaces are not created/initialized when only hostapd\nis managing the wlan interface. And if hostapd receives an ANQP Query REQ\nAction frame even from an un-associated STA, the brcmfmac driver tries\nto use an uninitialized P2P vif pointer for sending the IOVAR to firmware.\nThis NULL pointer dereferencing triggers a driver crash.\n\n [ 1417.074538] Unable to handle kernel NULL pointer dereference at virtual\n address 0000000000000000\n [...]\n [ 1417.075188] Hardware name: Raspberry Pi 4 Model B Rev 1.5 (DT)\n [...]\n [ 1417.075653] Call trace:\n [ 1417.075662] brcmf_p2p_send_action_frame+0x23c/0xc58 [brcmfmac]\n [ 1417.075738] brcmf_cfg80211_mgmt_tx+0x304/0x5c0 [brcmfmac]\n [ 1417.075810] cfg80211_mlme_mgmt_tx+0x1b0/0x428 [cfg80211]\n [ 1417.076067] nl80211_tx_mgmt+0x238/0x388 [cfg80211]\n [ 1417.076281] genl_family_rcv_msg_doit+0xe0/0x158\n [ 1417.076302] genl_rcv_msg+0x220/0x2a0\n [ 1417.076317] netlink_rcv_skb+0x68/0x140\n [ 1417.076330] genl_rcv+0x40/0x60\n [ 1417.076343] netlink_unicast+0x330/0x3b8\n [ 1417.076357] netlink_sendmsg+0x19c/0x3f8\n [ 1417.076370] __sock_sendmsg+0x64/0xc0\n [ 1417.076391] ____sys_sendmsg+0x268/0x2a0\n [ 1417.076408] ___sys_sendmsg+0xb8/0x118\n [ 1417.076427] __sys_sendmsg+0x90/0xf8\n [ 1417.076445] __arm64_sys_sendmsg+0x2c/0x40\n [ 1417.076465] invoke_syscall+0x50/0x120\n [ 1417.076486] el0_svc_common.constprop.0+0x48/0xf0\n [ 1417.076506] do_el0_svc+0x24/0x38\n [ 1417.076525] el0_svc+0x30/0x100\n [ 1417.076548] el0t_64_sync_handler+0x100/0x130\n [ 1417.076569] el0t_64_sync+0x190/0x198\n [ 1417.076589] Code: f9401e80 aa1603e2 f9403be1 5280e483 (f9400000)\n\nFix this, by always using the vif corresponding to the wdev on which the\nAction frame Transmission request was initiated by the userspace. This way,\neven if P2P vif is not available, the IOVAR is sent to firmware on AP vif\nand the ANQP Query RESP Action frame is transmitted without crashing the\ndriver.\n\nMove init_completion() for \"send_af_done\" from brcmf_p2p_create_p2pdev()\nto brcmf_p2p_attach(). Because the former function would not get executed\nwhen only hostapd is managing wlan interface, and it is not safe to do\nreinit_completion() later in brcmf_p2p_tx_action_frame(), without any prior\ninit_completion().\n\nAnd in the brcmf_p2p_tx_action_frame() function, the condition check for\nP2P Presence response frame is not needed, since the wpa_supplicant is\nproperly sending the P2P Presense Response frame on the P2P-GO vif instead\nof the P2P-Device vif.\n\n[Cc stable]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40321",
"url": "https://www.suse.com/security/cve/CVE-2025-40321"
},
{
"category": "external",
"summary": "SUSE Bug 1254795 for CVE-2025-40321",
"url": "https://bugzilla.suse.com/1254795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40321"
},
{
"cve": "CVE-2025-40322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40322"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: bitblit: bound-check glyph index in bit_putcs*\n\nbit_putcs_aligned()/unaligned() derived the glyph pointer from the\ncharacter value masked by 0xff/0x1ff, which may exceed the actual font\u0027s\nglyph count and read past the end of the built-in font array.\nClamp the index to the actual glyph count before computing the address.\n\nThis fixes a global out-of-bounds read reported by syzbot.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40322",
"url": "https://www.suse.com/security/cve/CVE-2025-40322"
},
{
"category": "external",
"summary": "SUSE Bug 1255092 for CVE-2025-40322",
"url": "https://bugzilla.suse.com/1255092"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40322"
},
{
"cve": "CVE-2025-40331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40331"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Prevent TOCTOU out-of-bounds write\n\nFor the following path not holding the sock lock,\n\n sctp_diag_dump() -\u003e sctp_for_each_endpoint() -\u003e sctp_ep_dump()\n\nmake sure not to exceed bounds in case the address list has grown\nbetween buffer allocation (time-of-check) and write (time-of-use).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40331",
"url": "https://www.suse.com/security/cve/CVE-2025-40331"
},
{
"category": "external",
"summary": "SUSE Bug 1254615 for CVE-2025-40331",
"url": "https://bugzilla.suse.com/1254615"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40331"
},
{
"cve": "CVE-2025-40337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40337"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: Correctly handle Rx checksum offload errors\n\nThe stmmac_rx function would previously set skb-\u003eip_summed to\nCHECKSUM_UNNECESSARY if hardware checksum offload (CoE) was enabled\nand the packet was of a known IP ethertype.\n\nHowever, this logic failed to check if the hardware had actually\nreported a checksum error. The hardware status, indicating a header or\npayload checksum failure, was being ignored at this stage. This could\ncause corrupt packets to be passed up the network stack as valid.\n\nThis patch corrects the logic by checking the `csum_none` status flag,\nwhich is set when the hardware reports a checksum error. If this flag\nis set, skb-\u003eip_summed is now correctly set to CHECKSUM_NONE,\nensuring the kernel\u0027s network stack will perform its own validation and\nproperly handle the corrupt packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40337",
"url": "https://www.suse.com/security/cve/CVE-2025-40337"
},
{
"category": "external",
"summary": "SUSE Bug 1255081 for CVE-2025-40337",
"url": "https://bugzilla.suse.com/1255081"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40337"
},
{
"cve": "CVE-2025-40349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40349"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: validate record offset in hfsplus_bmap_alloc\n\nhfsplus_bmap_alloc can trigger a crash if a\nrecord offset or length is larger than node_size\n\n[ 15.264282] BUG: KASAN: slab-out-of-bounds in hfsplus_bmap_alloc+0x887/0x8b0\n[ 15.265192] Read of size 8 at addr ffff8881085ca188 by task test/183\n[ 15.265949]\n[ 15.266163] CPU: 0 UID: 0 PID: 183 Comm: test Not tainted 6.17.0-rc2-gc17b750b3ad9 #14 PREEMPT(voluntary)\n[ 15.266165] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 15.266167] Call Trace:\n[ 15.266168] \u003cTASK\u003e\n[ 15.266169] dump_stack_lvl+0x53/0x70\n[ 15.266173] print_report+0xd0/0x660\n[ 15.266181] kasan_report+0xce/0x100\n[ 15.266185] hfsplus_bmap_alloc+0x887/0x8b0\n[ 15.266208] hfs_btree_inc_height.isra.0+0xd5/0x7c0\n[ 15.266217] hfsplus_brec_insert+0x870/0xb00\n[ 15.266222] __hfsplus_ext_write_extent+0x428/0x570\n[ 15.266225] __hfsplus_ext_cache_extent+0x5e/0x910\n[ 15.266227] hfsplus_ext_read_extent+0x1b2/0x200\n[ 15.266233] hfsplus_file_extend+0x5a7/0x1000\n[ 15.266237] hfsplus_get_block+0x12b/0x8c0\n[ 15.266238] __block_write_begin_int+0x36b/0x12c0\n[ 15.266251] block_write_begin+0x77/0x110\n[ 15.266252] cont_write_begin+0x428/0x720\n[ 15.266259] hfsplus_write_begin+0x51/0x100\n[ 15.266262] cont_write_begin+0x272/0x720\n[ 15.266270] hfsplus_write_begin+0x51/0x100\n[ 15.266274] generic_perform_write+0x321/0x750\n[ 15.266285] generic_file_write_iter+0xc3/0x310\n[ 15.266289] __kernel_write_iter+0x2fd/0x800\n[ 15.266296] dump_user_range+0x2ea/0x910\n[ 15.266301] elf_core_dump+0x2a94/0x2ed0\n[ 15.266320] vfs_coredump+0x1d85/0x45e0\n[ 15.266349] get_signal+0x12e3/0x1990\n[ 15.266357] arch_do_signal_or_restart+0x89/0x580\n[ 15.266362] irqentry_exit_to_user_mode+0xab/0x110\n[ 15.266364] asm_exc_page_fault+0x26/0x30\n[ 15.266366] RIP: 0033:0x41bd35\n[ 15.266367] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 9f 0b 00 00 66 0f ef c0 \u003cf3\u003e 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8f\n[ 15.266369] RSP: 002b:00007ffc9e62d078 EFLAGS: 00010283\n[ 15.266371] RAX: 00007ffc9e62d100 RBX: 0000000000000000 RCX: 0000000000000000\n[ 15.266372] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007ffc9e62d100\n[ 15.266373] RBP: 0000400000000040 R08: 00000000000000e0 R09: 0000000000000000\n[ 15.266374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n[ 15.266375] R13: 0000000000000000 R14: 0000000000000000 R15: 0000400000000000\n[ 15.266376] \u003c/TASK\u003e\n\nWhen calling hfsplus_bmap_alloc to allocate a free node, this function\nfirst retrieves the bitmap from header node and map node using node-\u003epage\ntogether with the offset and length from hfs_brec_lenoff\n\n```\nlen = hfs_brec_lenoff(node, 2, \u0026off16);\noff = off16;\n\noff += node-\u003epage_offset;\npagep = node-\u003epage + (off \u003e\u003e PAGE_SHIFT);\ndata = kmap_local_page(*pagep);\n```\n\nHowever, if the retrieved offset or length is invalid(i.e. exceeds\nnode_size), the code may end up accessing pages outside the allocated\nrange for this node.\n\nThis patch adds proper validation of both offset and length before use,\npreventing out-of-bounds page access. Move is_bnode_offset_valid and\ncheck_and_correct_requested_length to hfsplus_fs.h, as they may be\nrequired by other functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40349",
"url": "https://www.suse.com/security/cve/CVE-2025-40349"
},
{
"category": "external",
"summary": "SUSE Bug 1255280 for CVE-2025-40349",
"url": "https://bugzilla.suse.com/1255280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40349"
},
{
"cve": "CVE-2025-40351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40351"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()\n\nThe syzbot reported issue in hfsplus_delete_cat():\n\n[ 70.682285][ T9333] =====================================================\n[ 70.682943][ T9333] BUG: KMSAN: uninit-value in hfsplus_subfolders_dec+0x1d7/0x220\n[ 70.683640][ T9333] hfsplus_subfolders_dec+0x1d7/0x220\n[ 70.684141][ T9333] hfsplus_delete_cat+0x105d/0x12b0\n[ 70.684621][ T9333] hfsplus_rmdir+0x13d/0x310\n[ 70.685048][ T9333] vfs_rmdir+0x5ba/0x810\n[ 70.685447][ T9333] do_rmdir+0x964/0xea0\n[ 70.685833][ T9333] __x64_sys_rmdir+0x71/0xb0\n[ 70.686260][ T9333] x64_sys_call+0xcd8/0x3cf0\n[ 70.686695][ T9333] do_syscall_64+0xd9/0x1d0\n[ 70.687119][ T9333] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 70.687646][ T9333]\n[ 70.687856][ T9333] Uninit was stored to memory at:\n[ 70.688311][ T9333] hfsplus_subfolders_inc+0x1c2/0x1d0\n[ 70.688779][ T9333] hfsplus_create_cat+0x148e/0x1800\n[ 70.689231][ T9333] hfsplus_mknod+0x27f/0x600\n[ 70.689730][ T9333] hfsplus_mkdir+0x5a/0x70\n[ 70.690146][ T9333] vfs_mkdir+0x483/0x7a0\n[ 70.690545][ T9333] do_mkdirat+0x3f2/0xd30\n[ 70.690944][ T9333] __x64_sys_mkdir+0x9a/0xf0\n[ 70.691380][ T9333] x64_sys_call+0x2f89/0x3cf0\n[ 70.691816][ T9333] do_syscall_64+0xd9/0x1d0\n[ 70.692229][ T9333] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 70.692773][ T9333]\n[ 70.692990][ T9333] Uninit was stored to memory at:\n[ 70.693469][ T9333] hfsplus_subfolders_inc+0x1c2/0x1d0\n[ 70.693960][ T9333] hfsplus_create_cat+0x148e/0x1800\n[ 70.694438][ T9333] hfsplus_fill_super+0x21c1/0x2700\n[ 70.694911][ T9333] mount_bdev+0x37b/0x530\n[ 70.695320][ T9333] hfsplus_mount+0x4d/0x60\n[ 70.695729][ T9333] legacy_get_tree+0x113/0x2c0\n[ 70.696167][ T9333] vfs_get_tree+0xb3/0x5c0\n[ 70.696588][ T9333] do_new_mount+0x73e/0x1630\n[ 70.697013][ T9333] path_mount+0x6e3/0x1eb0\n[ 70.697425][ T9333] __se_sys_mount+0x733/0x830\n[ 70.697857][ T9333] __x64_sys_mount+0xe4/0x150\n[ 70.698269][ T9333] x64_sys_call+0x2691/0x3cf0\n[ 70.698704][ T9333] do_syscall_64+0xd9/0x1d0\n[ 70.699117][ T9333] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 70.699730][ T9333]\n[ 70.699946][ T9333] Uninit was created at:\n[ 70.700378][ T9333] __alloc_pages_noprof+0x714/0xe60\n[ 70.700843][ T9333] alloc_pages_mpol_noprof+0x2a2/0x9b0\n[ 70.701331][ T9333] alloc_pages_noprof+0xf8/0x1f0\n[ 70.701774][ T9333] allocate_slab+0x30e/0x1390\n[ 70.702194][ T9333] ___slab_alloc+0x1049/0x33a0\n[ 70.702635][ T9333] kmem_cache_alloc_lru_noprof+0x5ce/0xb20\n[ 70.703153][ T9333] hfsplus_alloc_inode+0x5a/0xd0\n[ 70.703598][ T9333] alloc_inode+0x82/0x490\n[ 70.703984][ T9333] iget_locked+0x22e/0x1320\n[ 70.704428][ T9333] hfsplus_iget+0x5c/0xba0\n[ 70.704827][ T9333] hfsplus_btree_open+0x135/0x1dd0\n[ 70.705291][ T9333] hfsplus_fill_super+0x1132/0x2700\n[ 70.705776][ T9333] mount_bdev+0x37b/0x530\n[ 70.706171][ T9333] hfsplus_mount+0x4d/0x60\n[ 70.706579][ T9333] legacy_get_tree+0x113/0x2c0\n[ 70.707019][ T9333] vfs_get_tree+0xb3/0x5c0\n[ 70.707444][ T9333] do_new_mount+0x73e/0x1630\n[ 70.707865][ T9333] path_mount+0x6e3/0x1eb0\n[ 70.708270][ T9333] __se_sys_mount+0x733/0x830\n[ 70.708711][ T9333] __x64_sys_mount+0xe4/0x150\n[ 70.709158][ T9333] x64_sys_call+0x2691/0x3cf0\n[ 70.709630][ T9333] do_syscall_64+0xd9/0x1d0\n[ 70.710053][ T9333] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 70.710611][ T9333]\n[ 70.710842][ T9333] CPU: 3 UID: 0 PID: 9333 Comm: repro Not tainted 6.12.0-rc6-dirty #17\n[ 70.711568][ T9333] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 70.712490][ T9333] =====================================================\n[ 70.713085][ T9333] Disabling lock debugging due to kernel taint\n[ 70.713618][ T9333] Kernel panic - not syncing: kmsan.panic set ...\n[ 70.714159][ T9333] \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40351",
"url": "https://www.suse.com/security/cve/CVE-2025-40351"
},
{
"category": "external",
"summary": "SUSE Bug 1255281 for CVE-2025-40351",
"url": "https://bugzilla.suse.com/1255281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-40351"
},
{
"cve": "CVE-2025-68206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_ct: add seqadj extension for natted connections\n\nSequence adjustment may be required for FTP traffic with PASV/EPSV modes.\ndue to need to re-write packet payload (IP, port) on the ftp control\nconnection. This can require changes to the TCP length and expected\nseq / ack_seq.\n\nThe easiest way to reproduce this issue is with PASV mode.\nExample ruleset:\ntable inet ftp_nat {\n ct helper ftp_helper {\n type \"ftp\" protocol tcp\n l3proto inet\n }\n\n chain prerouting {\n type filter hook prerouting priority 0; policy accept;\n tcp dport 21 ct state new ct helper set \"ftp_helper\"\n }\n}\ntable ip nat {\n chain prerouting {\n type nat hook prerouting priority -100; policy accept;\n tcp dport 21 dnat ip prefix to ip daddr map {\n\t\t\t192.168.100.1 : 192.168.13.2/32 }\n }\n\n chain postrouting {\n type nat hook postrouting priority 100 ; policy accept;\n tcp sport 21 snat ip prefix to ip saddr map {\n\t\t\t192.168.13.2 : 192.168.100.1/32 }\n }\n}\n\nNote that the ftp helper gets assigned *after* the dnat setup.\n\nThe inverse (nat after helper assign) is handled by an existing\ncheck in nf_nat_setup_info() and will not show the problem.\n\nTopoloy:\n\n +-------------------+ +----------------------------------+\n | FTP: 192.168.13.2 | \u003c-\u003e | NAT: 192.168.13.3, 192.168.100.1 |\n +-------------------+ +----------------------------------+\n |\n +-----------------------+\n | Client: 192.168.100.2 |\n +-----------------------+\n\nftp nat changes do not work as expected in this case:\nConnected to 192.168.100.1.\n[..]\nftp\u003e epsv\nEPSV/EPRT on IPv4 off.\nftp\u003e ls\n227 Entering passive mode (192,168,100,1,209,129).\n421 Service not available, remote server has closed connection.\n\nKernel logs:\nMissing nfct_seqadj_ext_add() setup call\nWARNING: CPU: 1 PID: 0 at net/netfilter/nf_conntrack_seqadj.c:41\n[..]\n __nf_nat_mangle_tcp_packet+0x100/0x160 [nf_nat]\n nf_nat_ftp+0x142/0x280 [nf_nat_ftp]\n help+0x4d1/0x880 [nf_conntrack_ftp]\n nf_confirm+0x122/0x2e0 [nf_conntrack]\n nf_hook_slow+0x3c/0xb0\n ..\n\nFix this by adding the required extension when a conntrack helper is assigned\nto a connection that has a nat binding.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68206",
"url": "https://www.suse.com/security/cve/CVE-2025-68206"
},
{
"category": "external",
"summary": "SUSE Bug 1255142 for CVE-2025-68206",
"url": "https://bugzilla.suse.com/1255142"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-68206"
},
{
"cve": "CVE-2025-68340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68340"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nteam: Move team device type change at the end of team_port_add\n\nAttempting to add a port device that is already up will expectedly fail,\nbut not before modifying the team device header_ops.\n\nIn the case of the syzbot reproducer the gre0 device is\nalready in state UP when it attempts to add it as a\nport device of team0, this fails but before that\nheader_ops-\u003ecreate of team0 is changed from eth_header to ipgre_header\nin the call to team_dev_type_check_change.\n\nLater when we end up in ipgre_header() struct ip_tunnel* points to nonsense\nas the private data of the device still holds a struct team.\n\nExample sequence of iproute2 commands to reproduce the hang/BUG():\nip link add dev team0 type team\nip link add dev gre0 type gre\nip link set dev gre0 up\nip link set dev gre0 master team0\nip link set dev team0 up\nping -I team0 1.1.1.1\n\nMove team_dev_type_check_change down where all other checks have passed\nas it changes the dev type with no way to restore it in case\none of the checks that follow it fail.\n\nAlso make sure to preserve the origial mtu assignment:\n - If port_dev is not the same type as dev, dev takes mtu from port_dev\n - If port_dev is the same type as dev, port_dev takes mtu from dev\n\nThis is done by adding a conditional before the call to dev_set_mtu\nto prevent it from assigning port_dev-\u003emtu = dev-\u003emtu and instead\nletting team_dev_type_check_change assign dev-\u003emtu = port_dev-\u003emtu.\nThe conditional is needed because the patch moves the call to\nteam_dev_type_check_change past dev_set_mtu.\n\nTesting:\n - team device driver in-tree selftests\n - Add/remove various devices as slaves of team device\n - syzbot",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68340",
"url": "https://www.suse.com/security/cve/CVE-2025-68340"
},
{
"category": "external",
"summary": "SUSE Bug 1255507 for CVE-2025-68340",
"url": "https://bugzilla.suse.com/1255507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_290-default-1-8.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.290.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.290.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.290.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T14:35:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-68340"
}
]
}
SUSE-SU-2025:4521-1
Vulnerability from csaf_suse - Published: 2025-12-24 12:42 - Updated: 2025-12-24 12:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes).\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes).\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes).\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).\n- RDMA/irdma: Fix SD index calculation (git-fixes).\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes).\n- Revert \u0027drm/tegra: dsi: Clear enable register if powered by bootloader\u0027 (git-fixes).\n- Revert \u0027wifi: ath10k: avoid unnecessary wait for service ready message\u0027 (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- kabi/severities: drop xfer_to_guest_mode_handle_work.\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4521,SUSE-SLE-Module-Live-Patching-15-SP6-2025-4521,SUSE-SLE-Module-RT-15-SP6-2025-4521,openSUSE-SLE-15.6-2025-4521",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4521-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4521-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254521-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4521-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-24T12:42:49Z",
"generator": {
"date": "2025-12-24T12:42:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4521-1",
"initial_release_date": "2025-12-24T12:42:49Z",
"revision_history": [
{
"date": "2025-12-24T12:42:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"product": {
"name": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"product_id": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"product": {
"name": "kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"product_id": "kernel-source-rt-6.4.0-150600.10.61.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-extra-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-livepatch-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-optional-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"product_id": "reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP6",
"product": {
"name": "SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-150600.10.61.1.noarch as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of SUSE Real Time Module 15 SP6",
"product_id": "SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-extra-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-optional-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-150600.10.61.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
},
"product_reference": "reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_61-rt-1-150600.1.3.1.x86_64",
"SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"SUSE Real Time Module 15 SP6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"SUSE Real Time Module 15 SP6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-extra-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-livepatch-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-optional-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-devel-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-rt_debug-vdso-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kernel-source-rt-6.4.0-150600.10.61.1.noarch",
"openSUSE Leap 15.6:kernel-syms-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-rt-6.4.0-150600.10.61.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.61.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-24T12:42:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:20059-1
Vulnerability from csaf_suse - Published: 2026-01-07 10:55 - Updated: 2026-01-07 10:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: net: dst_cache: annotate data-races around dst_cache-\u003ereset_ts (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n- CVE-2025-40206: Add missing bugzilla reference to net fix (bsc#1250237 bsc#1253393).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes)\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes)\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes)\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes)\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes)\n- RDMA/irdma: Fix SD index calculation (git-fixes)\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes)\n- Revert \"drm/tegra: dsi: Clear enable register if powered by bootloader\" (git-fixes).\n- Revert \"wifi: ath10k: avoid unnecessary wait for service ready message\" (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes) (git-fixes).\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-kernel-230",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20059-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20059-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620059-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20059-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-01-07T10:55:44Z",
"generator": {
"date": "2026-01-07T10:55:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20059-1",
"initial_release_date": "2026-01-07T10:55:44Z",
"revision_history": [
{
"date": "2026-01-07T10:55:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-6.4.0-39.1.aarch64",
"product": {
"name": "kernel-rt-6.4.0-39.1.aarch64",
"product_id": "kernel-rt-6.4.0-39.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.4.0-39.1.aarch64",
"product": {
"name": "kernel-rt-devel-6.4.0-39.1.aarch64",
"product_id": "kernel-rt-devel-6.4.0-39.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-6.4.0-39.1.noarch",
"product": {
"name": "kernel-devel-rt-6.4.0-39.1.noarch",
"product_id": "kernel-devel-rt-6.4.0-39.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-6.4.0-39.1.noarch",
"product": {
"name": "kernel-source-rt-6.4.0-39.1.noarch",
"product_id": "kernel-source-rt-6.4.0-39.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-6.4.0-39.1.x86_64",
"product": {
"name": "kernel-rt-6.4.0-39.1.x86_64",
"product_id": "kernel-rt-6.4.0-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.4.0-39.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.4.0-39.1.x86_64",
"product_id": "kernel-rt-devel-6.4.0-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.4.0-39.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.4.0-39.1.x86_64",
"product_id": "kernel-rt-livepatch-6.4.0-39.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-39.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-39.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64"
},
"product_reference": "kernel-rt-6.4.0-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-39.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64"
},
"product_reference": "kernel-rt-6.4.0-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-39.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64"
},
"product_reference": "kernel-rt-devel-6.4.0-39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-39.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.4.0-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-6.4.0-39.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-6.4.0-39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-39.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-39.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-devel-rt-6.4.0-39.1.noarch",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.aarch64",
"SUSE Linux Micro 6.1:kernel-rt-devel-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-rt-livepatch-6.4.0-39.1.x86_64",
"SUSE Linux Micro 6.1:kernel-source-rt-6.4.0-39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-07T10:55:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2025:4516-1
Vulnerability from csaf_suse - Published: 2025-12-23 16:27 - Updated: 2025-12-23 16:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP7 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n- CVE-2025-40206: Add missing bugzilla reference to net fix (bsc#1250237 bsc#1253393).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tas2781: fix getting the wrong device number (git-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() (git-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- Fix \u0027drm/xe: Do not allow evicting of BOs in same VM in array of VM binds\u0027 (bsc#1252923).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SEV: Enforce minimum GHCB version requirement for SEV-SNP guests (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- KVM: x86: Have all vendor neutral sub-configs depend on KVM_X86, not just KVM (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes)\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes)\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes).\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).\n- RDMA/irdma: Fix SD index calculation (git-fixes).\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes)\n- Revert \u0027drm/tegra: dsi: Clear enable register if powered by bootloader\u0027 (git-fixes).\n- Revert \u0027wifi: ath10k: avoid unnecessary wait for service ready message\u0027 (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- acpi/hmat: Fix lockdep warning for hmem_register_resource() (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- ata: libata-scsi: Add missing scsi_device_put() in ata_scsi_dev_rescan() (git-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- bpf: Fix test verif_scale_strobemeta_subprogs failure due to llvm19 (bsc#1252368).\n- bpf: improve error message for unsupported helper (bsc#1252370).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- cgroup/cpuset: Remove remote_partition_check() \u0026 make update_cpumasks_hier() handle remote partition (bsc#1241166).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cpuset: Use new excpus for nocpu error check when enabling root partition (bsc#1241166).\n- cpuset: fix failure to enable isolated partition when containing isolcpus (bsc#1241166).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/amdgpu: Release xcp drm memory after unplug (stable-fixes).\n- drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with DC_FP_START (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Add fallback path for YCBCR422 (stable-fixes).\n- drm/amd/display: Allow VRR params change if unsynced with the stream (git-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Enable mst when it\u0027s detected but yet to be initialized (git-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Fix for test crash due to power gating (stable-fixes).\n- drm/amd/display: Fix incorrect return of vblank enable on unconfigured crtc (stable-fixes).\n- drm/amd/display: Fix pbn_div Calculation Error (stable-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting (stable-fixes).\n- drm/amd/display: Init dispclk from bootup clock for DCN314 (stable-fixes).\n- drm/amd/display: Move setup_stream_attribute (stable-fixes).\n- drm/amd/display: Reject modes with too high pixel clock on DCE6-10 (git-fixes).\n- drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off (stable-fixes).\n- drm/amd/display: Set up pixel encoding for YCBCR422 (stable-fixes).\n- drm/amd/display: Support HW cursor 180 rot for any number of pipe splits (stable-fixes).\n- drm/amd/display: Wait until OTG enable state is cleared (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: change dc stream color settings only in atomic commit (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: fix condition for setting timing_adjust_pending (stable-fixes).\n- drm/amd/display: fix dml ms order of operations (stable-fixes).\n- drm/amd/display: incorrect conditions for failing dto calculations (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Check that VPE has reached DPM0 in idle handler (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu/smu: Handle S0ix for vangogh (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Check vcn sram load return value (stable-fixes).\n- drm/amdgpu: Correct the counts of nr_banks and nr_errors (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Fix function header names in amdgpu_connectors.c (git-fixes).\n- drm/amdgpu: Fix unintended error log in VCN5_0_0 (git-fixes).\n- drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2) (stable-fixes).\n- drm/amdgpu: Skip poison aca bank from UE channel (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add range check for RAS bad page address (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM surfaces (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: fix nullptr err of vm_handle_moved (stable-fixes).\n- drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdgpu: remove two invalid BUG_ON()s (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: relax checks for over allocation of save area (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/ast: Blank with VGACR17 sync enable, always clear VGACRB6 sync off (git-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/exynos: exynos7_drm_decon: remove ctx-\u003esuspended (git-fixes).\n- drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/mediatek: Add pm_runtime support for GCE power control (git-fixes).\n- drm/mediatek: Disable AFBC support on Mediatek DRM driver (git-fixes).\n- drm/msm/a6xx: Fix PDC sleep sequence (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm/registers: Generate _HI/LO builders for reg64 (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/panthor: Serialize GPU cache flush operations (stable-fixes).\n- drm/panthor: check bo offset alignment in vm bind (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/sched: Optimise drm_sched_entity_push_job (stable-fixes).\n- drm/sched: avoid killing parent entity on child SIGKILL (stable-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- drm/xe/guc: Add more GuC load error status codes (stable-fixes).\n- drm/xe/guc: Increase GuC crash dump buffer size (stable-fixes).\n- drm/xe/guc: Return an error code if the GuC load fails (stable-fixes).\n- drm/xe/guc: Set upper limit of H2G retries over CTB (stable-fixes).\n- drm/xe/guc: Synchronize Dead CT worker with unbind (git-fixes).\n- drm/xe: Do clean shutdown also when using flr (git-fixes).\n- drm/xe: Do not wake device during a GT reset (git-fixes).\n- drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test (stable-fixes).\n- drm/xe: Move declarations under conditional branch (stable-fixes).\n- drm/xe: Remove duplicate DRM_EXEC selection from Kconfig (git-fixes).\n- drm: panel-backlight-quirks: Make EDID match optional (stable-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- hyperv: Remove the spurious null directive line (git-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- ixgbe: fix memory leak and use-after-free in ixgbe_recovery_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes) (git-fixes).\n- kabi/severities: drop xfer_to_guest_mode_handle_work.\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- media: videobuf2: forbid remove_bufs when legacy fileio is active (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- nvme-auth: add hkdf_expand_label() (bsc#1247683).\n- nvme-auth: use hkdf_expand_label() (bsc#1247683).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- powerpc: export MIN RMA size (bsc#1236743 ltc#211409).\n- powerpc: increase MIN RMA size for CAS negotiation (bsc#1236743 ltc#211409 bsc#1252269 ltc#215957).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Check for timeout in perf_link test (bsc#1253648).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Remove sockmap_ktls disconnect_after_delete test (bsc#1252365).\n- selftests/bpf: Remove tests for zeroed-array kptr (bsc#1252366).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- selftests/net/forwarding: add slowwait functions (bsc#1254235).\n- selftests/net/lib: no need to record ns name if it already exist (bsc#1254235).\n- selftests/net/lib: update busywait timeout value (bsc#1254235).\n- selftests/net: add lib.sh (bsc#1254235).\n- selftests/net: add variable NS_LIST for lib.sh (bsc#1254235).\n- selftests/net: use tc rule to filter the na packet (bsc#1254235).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- selftests: forwarding.config.sample: Move overrides to lib.sh (bsc#1254235).\n- selftests: forwarding: Add a test for testing lib.sh functionality (bsc#1254235).\n- selftests: forwarding: Avoid failures to source net/lib.sh (bsc#1254235).\n- selftests: forwarding: Change inappropriate log_test_skip() calls (bsc#1254235).\n- selftests: forwarding: Convert log_test() to recognize RET values (bsc#1254235).\n- selftests: forwarding: Have RET track kselftest framework constants (bsc#1254235).\n- selftests: forwarding: Parametrize mausezahn delay (bsc#1254235).\n- selftests: forwarding: Redefine relative_path variable (bsc#1254235).\n- selftests: forwarding: Remove duplicated lib.sh content (bsc#1254235).\n- selftests: forwarding: Support for performance sensitive tests (bsc#1254235).\n- selftests: lib: Define more kselftest exit codes (bsc#1254235).\n- selftests: lib: tc_rule_stats_get(): Move default to argument definition (bsc#1254235).\n- selftests: net: List helper scripts in TEST_FILES Makefile variable (bsc#1254235).\n- selftests: net: Unify code of busywait() and slowwait() (bsc#1254235).\n- selftests: net: add helper for checking if nettest is available (bsc#1254235).\n- selftests: net: lib: Do not overwrite error messages (bsc#1254235).\n- selftests: net: lib: Move logging from forwarding/lib.sh here (bsc#1254235).\n- selftests: net: lib: avoid error removing empty netns name (bsc#1254235).\n- selftests: net: lib: do not set ns var as readonly (bsc#1254235).\n- selftests: net: lib: fix shift count out of range (bsc#1254235).\n- selftests: net: lib: ignore possible errors (bsc#1254235).\n- selftests: net: lib: kill PIDs before del netns (bsc#1254235).\n- selftests: net: lib: remove \u0027ns\u0027 var in setup_ns (bsc#1254235).\n- selftests: net: lib: remove ns from list after clean-up (bsc#1254235).\n- selftests: net: lib: set \u0027i\u0027 as local (bsc#1254235).\n- selftests: net: lib: support errexit with busywait (bsc#1254235).\n- selftests: net: libs: Change variable fallback syntax (bsc#1254235).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/hv: fcopy: Fix incorrect file path conversion (git-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list (stable-fixes).\n- wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in lower bands (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: Track NAN interface start/stop (stable-fixes).\n- wifi: mac80211: do not mark keys for inactive links as uploaded (stable-fixes).\n- wifi: mac80211: fix key tailroom accounting leak (git-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: rtw89: print just once for unknown C2H events (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xe/oa: Fix query mode of operation for OAR/OAC (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4516,SUSE-SLE-Module-Live-Patching-15-SP7-2025-4516,SUSE-SLE-Module-RT-15-SP7-2025-4516",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4516-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4516-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254516-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4516-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1236743",
"url": "https://bugzilla.suse.com/1236743"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1241166",
"url": "https://bugzilla.suse.com/1241166"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1247683",
"url": "https://bugzilla.suse.com/1247683"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252269",
"url": "https://bugzilla.suse.com/1252269"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252365",
"url": "https://bugzilla.suse.com/1252365"
},
{
"category": "self",
"summary": "SUSE Bug 1252366",
"url": "https://bugzilla.suse.com/1252366"
},
{
"category": "self",
"summary": "SUSE Bug 1252368",
"url": "https://bugzilla.suse.com/1252368"
},
{
"category": "self",
"summary": "SUSE Bug 1252370",
"url": "https://bugzilla.suse.com/1252370"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252774",
"url": "https://bugzilla.suse.com/1252774"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253648",
"url": "https://bugzilla.suse.com/1253648"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254235",
"url": "https://bugzilla.suse.com/1254235"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40080 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-23T16:27:39Z",
"generator": {
"date": "2025-12-23T16:27:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4516-1",
"initial_release_date": "2025-12-23T16:27:39Z",
"revision_history": [
{
"date": "2025-12-23T16:27:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"product": {
"name": "kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"product_id": "kernel-devel-rt-6.4.0-150700.7.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"product": {
"name": "kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"product_id": "kernel-source-rt-6.4.0-150700.7.25.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-devel-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-extra-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-extra-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-livepatch-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-optional-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-optional-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-vdso-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-rt-vdso-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-rt-vdso-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "kernel-syms-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "kselftests-kmp-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"product_id": "reiserfs-kmp-rt-6.4.0-150700.7.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP7",
"product": {
"name": "SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-150700.7.25.1.noarch as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "kernel-rt-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-150700.7.25.1.noarch as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: restrict sockets to TCP and UDP\n\nRecently, syzbot started to abuse NBD with all kinds of sockets.\n\nCommit cf1b2326b734 (\"nbd: verify socket is supported during setup\")\nmade sure the socket supported a shutdown() method.\n\nExplicitely accept TCP and UNIX stream sockets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40080",
"url": "https://www.suse.com/security/cve/CVE-2025-40080"
},
{
"category": "external",
"summary": "SUSE Bug 1252774 for CVE-2025-40080",
"url": "https://bugzilla.suse.com/1252774"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40080"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_25-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.25.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.25.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-23T16:27:39Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:20496-1
Vulnerability from csaf_suse - Published: 2026-02-19 15:57 - Updated: 2026-02-19 15:57Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Do not leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n- CVE-2025-40206: Add missing bugzilla reference to net fix (bsc#1253393).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes) (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes)\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes)\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes)\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes)\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes)\n- RDMA/irdma: Fix SD index calculation (git-fixes)\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes)\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-kernel-260",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20496-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20496-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620496-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20496-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-02-19T15:57:41Z",
"generator": {
"date": "2026-02-19T15:57:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20496-1",
"initial_release_date": "2026-02-19T15:57:41Z",
"revision_history": [
{
"date": "2026-02-19T15:57:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-38.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-38.1.aarch64",
"product_id": "kernel-default-6.4.0-38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-38.1.21.15.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-38.1.21.15.aarch64",
"product_id": "kernel-default-base-6.4.0-38.1.21.15.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-38.1.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-38.1.aarch64",
"product_id": "kernel-default-devel-6.4.0-38.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-38.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-38.1.noarch",
"product_id": "kernel-devel-6.4.0-38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-38.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-38.1.noarch",
"product_id": "kernel-macros-6.4.0-38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-38.1.noarch",
"product": {
"name": "kernel-source-6.4.0-38.1.noarch",
"product_id": "kernel-source-6.4.0-38.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-38.1.ppc64le",
"product": {
"name": "kernel-default-6.4.0-38.1.ppc64le",
"product_id": "kernel-default-6.4.0-38.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"product_id": "kernel-default-base-6.4.0-38.1.21.15.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-38.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-38.1.ppc64le",
"product_id": "kernel-default-devel-6.4.0-38.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-38.1.s390x",
"product": {
"name": "kernel-default-6.4.0-38.1.s390x",
"product_id": "kernel-default-6.4.0-38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-38.1.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-38.1.s390x",
"product_id": "kernel-default-devel-6.4.0-38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-38.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-38.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-38.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-38.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-38.1.x86_64",
"product_id": "kernel-default-6.4.0-38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-38.1.21.15.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-38.1.21.15.x86_64",
"product_id": "kernel-default-base-6.4.0-38.1.21.15.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-38.1.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-38.1.x86_64",
"product_id": "kernel-default-devel-6.4.0-38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-38.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-38.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-38.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-38.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-38.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-38.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-38.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-38.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x"
},
"product_reference": "kernel-default-6.4.0-38.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-38.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-38.1.21.15.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-38.1.21.15.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-38.1.21.15.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-38.1.21.15.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-38.1.21.15.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-38.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-38.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-38.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-38.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-38.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-38.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-38.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-38.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-38.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-38.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-38.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-38.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.4.0-38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-38.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-38.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-38.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
},
"product_reference": "kernel-source-6.4.0-38.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \u201cHey, I\u0027m ready for interrupts\u201d.\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T15:57:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2025:4505-1
Vulnerability from csaf_suse - Published: 2025-12-22 16:35 - Updated: 2025-12-22 16:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes).\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes).\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes).\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).\n- RDMA/irdma: Fix SD index calculation (git-fixes).\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes).\n- Revert \u0027drm/tegra: dsi: Clear enable register if powered by bootloader\u0027 (git-fixes).\n- Revert \u0027wifi: ath10k: avoid unnecessary wait for service ready message\u0027 (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- kabi/severities: drop xfer_to_guest_mode_handle_work.\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- powerpc: export MIN RMA size (bsc#1236743).\n- powerpc: increase MIN RMA size for CAS negotiation (bsc#1236743, bsc#1252269).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4505,SUSE-SLE-Module-Public-Cloud-15-SP6-2025-4505,openSUSE-SLE-15.6-2025-4505",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4505-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4505-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254505-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4505-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1236743",
"url": "https://bugzilla.suse.com/1236743"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252269",
"url": "https://bugzilla.suse.com/1252269"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-22T16:35:13Z",
"generator": {
"date": "2025-12-22T16:35:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4505-1",
"initial_release_date": "2025-12-22T16:35:13Z",
"revision_history": [
{
"date": "2025-12-22T16:35:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "kernel-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "kernel-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"product_id": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"product_id": "kernel-azure-extra-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"product_id": "kernel-azure-optional-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product": {
"name": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"product_id": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"product": {
"name": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"product_id": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"product": {
"name": "kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"product_id": "kernel-source-azure-6.4.0-150600.8.58.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kernel-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "kernel-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"product_id": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"product_id": "kernel-azure-extra-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"product_id": "kernel-azure-optional-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"product_id": "kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"product_id": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150600.8.58.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150600.8.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch"
},
"product_reference": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-6.4.0-150600.8.58.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch"
},
"product_reference": "kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch"
},
"product_reference": "kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-6.4.0-150600.8.58.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch"
},
"product_reference": "kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64"
},
"product_reference": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-devel-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-extra-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-azure-optional-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-azure-vdso-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-source-azure-6.4.0-150600.8.58.1.noarch",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-azure-6.4.0-150600.8.58.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-azure-6.4.0-150600.8.58.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:35:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:20473-1
Vulnerability from csaf_suse - Published: 2026-02-19 16:55 - Updated: 2026-02-19 16:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Do not leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n- CVE-2025-40206: Add missing bugzilla reference to net fix (bsc#1253393).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes) (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes)\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes)\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes)\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes)\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes)\n- RDMA/irdma: Fix SD index calculation (git-fixes)\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes)\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- perf script: add --addr2line option (bsc#1247509).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Do not use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: do not preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-kernel-260",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20473-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20473-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620473-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20473-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html"
},
{
"category": "self",
"summary": "SUSE Bug 1232223",
"url": "https://bugzilla.suse.com/1232223"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247079",
"url": "https://bugzilla.suse.com/1247079"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38361 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-02-19T16:55:02Z",
"generator": {
"date": "2026-02-19T16:55:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20473-1",
"initial_release_date": "2026-02-19T16:55:02Z",
"revision_history": [
{
"date": "2026-02-19T16:55:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-38.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-38.1.aarch64",
"product_id": "kernel-default-6.4.0-38.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-38.1.21.15.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-38.1.21.15.aarch64",
"product_id": "kernel-default-base-6.4.0-38.1.21.15.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-38.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-38.1.noarch",
"product_id": "kernel-devel-6.4.0-38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-38.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-38.1.noarch",
"product_id": "kernel-macros-6.4.0-38.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-38.1.noarch",
"product": {
"name": "kernel-source-6.4.0-38.1.noarch",
"product_id": "kernel-source-6.4.0-38.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-38.1.s390x",
"product": {
"name": "kernel-default-6.4.0-38.1.s390x",
"product_id": "kernel-default-6.4.0-38.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-38.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-38.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-38.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-38.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-38.1.x86_64",
"product_id": "kernel-default-6.4.0-38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-38.1.21.15.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-38.1.21.15.x86_64",
"product_id": "kernel-default-base-6.4.0-38.1.21.15.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-38.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-38.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-38.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-38.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-38.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-38.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-38.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-38.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-38.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x"
},
"product_reference": "kernel-default-6.4.0-38.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-38.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-38.1.21.15.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-38.1.21.15.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-38.1.21.15.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-38.1.21.15.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-38.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-38.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-38.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-38.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-38.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-38.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.4.0-38.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-38.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-38.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-38.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
},
"product_reference": "kernel-source-6.4.0-38.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check dce_hwseq before dereferencing it\n\n[WHAT]\n\nhws was checked for null earlier in dce110_blank_stream, indicating hws\ncan be null, and should be checked whenever it is used.\n\n(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38361",
"url": "https://www.suse.com/security/cve/CVE-2025-38361"
},
{
"category": "external",
"summary": "SUSE Bug 1247079 for CVE-2025-38361",
"url": "https://bugzilla.suse.com/1247079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \u201cHey, I\u0027m ready for interrupts\u201d.\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-38.1.21.15.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-38.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-38.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-38.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-19T16:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:0473-1
Vulnerability from csaf_suse - Published: 2026-02-12 11:26 - Updated: 2026-02-12 11:26Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50347: mmc: rtsx_usb_sdmmc: fix return value check of mmc_add_host() (bsc#1249928).\n- CVE-2022-50580: blk-throttle: prevent overflow while calculating wait time (bsc#1252542).\n- CVE-2022-50676: net: rds: don\u0027t hold sock lock when cancelling work from rds_tcp_reset_callbacks() (bsc#1254689).\n- CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant uninit (bsc#1255594).\n- CVE-2022-50709: wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() (bsc#1255565).\n- CVE-2022-50716: wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out (bsc#1255839).\n- CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255844).\n- CVE-2022-50719: ALSA: line6: fix stack overflow in line6_midi_transmit (bsc#1255939).\n- CVE-2022-50740: wifi: ath9k: hif_usb: fix memory leak of urbs in ath9k_hif_usb_dealloc_tx_urbs() (bsc#1256155).\n- CVE-2022-50744: scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1256165).\n- CVE-2022-50749: acct: fix potential integer overflow in encode_comp_t() (bsc#1256191).\n- CVE-2022-50751: configfs: fix possible memory leak in configfs_create_dir() (bsc#1256184).\n- CVE-2022-50760: drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios() (bsc#1255983).\n- CVE-2022-50770: ocfs2: fix memory leak in ocfs2_mount_volume() (bsc#1256221).\n- CVE-2022-50777: net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe (bsc#1256320).\n- CVE-2022-50780: net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed (bsc#1256305).\n- CVE-2022-50782: ext4: fix bug_on in __es_tree_search caused by bad quota inode (bsc#1256282).\n- CVE-2022-50786: media: s5p-mfc: Clear workbit to handle error condition (bsc#1256258).\n- CVE-2022-50816: ipv6: ensure sane device mtu in tunnels (bsc#1256038).\n- CVE-2022-50834: nfc: Fix potential resource leaks (bsc#1256219).\n- CVE-2022-50865: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() (bsc#1256168).\n- CVE-2022-50868: hwrng: amd - Fix PCI device refcount leak (bsc#1256386).\n- CVE-2022-50880: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() (bsc#1256132).\n- CVE-2022-50881: ath9k: Fix typo in function name (bsc#1256130).\n- CVE-2022-50884: drm: Prevent drm_copy_field() to attempt copying a NULL pointer (bsc#1256127).\n- CVE-2022-50885: RDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when socket create failed (bsc#1256122).\n- CVE-2022-50887: regulator: core: fix unbalanced of node refcount in regulator_dev_lookup() (bsc#1256125).\n- CVE-2023-50756: nvme-pci: fix mempool alloc size (bsc#1256216).\n- CVE-2023-53685: tun: Fix memory leak for detached NAPI queue (bsc#1251770).\n- CVE-2023-53747: vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF (bsc#1254572).\n- CVE-2023-53751: cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname (bsc#1254986).\n- CVE-2023-53825: kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg() (bsc#1254707).\n- CVE-2023-53853: netlink: annotate accesses to nlk-\u003ecb_running (bsc#1254673).\n- CVE-2023-53863: netlink: do not hard code device address lenth in fdb dumps (bsc#1254657).\n- CVE-2023-53992: wifi: cfg80211: ocb: don\u0027t leave if not joined (bsc#1256058).\n- CVE-2023-54012: net: fix stack overflow when LRO is disabled for virtual interfaces (bsc#1255571).\n- CVE-2023-54047: drm/rockchip: dw_hdmi: cleanup drm encoder during unbind (bsc#1256398).\n- CVE-2023-54048: RDMA/bnxt_re: Prevent handling any completions after qp destroy (bsc#1256395).\n- CVE-2023-54067: btrfs: fix race when deleting free space root from the dirty cow roots list (bsc#1256369).\n- CVE-2023-54111: pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups (bsc#1256149).\n- CVE-2023-54112: kcm: Fix memory leak in error path of kcm_sendmsg() (bsc#1256354).\n- CVE-2023-54118: serial: sc16is7xx: setup GPIO controller later in probe (bsc#1256131).\n- CVE-2023-54121: btrfs: fix incorrect splitting in btrfs_drop_extent_map_range (bsc#1256267).\n- CVE-2023-54134: autofs: fix memory leak of waitqueues in autofs_catatonic_mode (bsc#1256106).\n- CVE-2023-54198: tty: fix out-of-bounds access in tty_driver_lookup_tty() (bsc#1255970).\n- CVE-2023-54202: drm/i915: fix race condition UAF in i915_perf_add_config_ioctl (bsc#1255880).\n- CVE-2023-54207: HID: uclogic: Correct devm device reference for hidinput input_dev name (bsc#1255961).\n- CVE-2023-54218: sock: Make sock-\u003esk_stamp thread-safe (bsc#1256229).\n- CVE-2023-54230: amba: bus: fix refcount leak (bsc#1255925).\n- CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free (bsc#1255908).\n- CVE-2023-54265: ipv6: Fix an uninit variable access bug in __ip6_make_skb() (bsc#1255874).\n- CVE-2023-54274: RDMA/srpt: Add a check for valid \u0027mad_agent\u0027 pointer (bsc#1255905).\n- CVE-2023-54282: media: tuners: qt1010: replace BUG_ON with a regular error (bsc#1255810).\n- CVE-2023-54287: tty: serial: imx: disable Ageing Timer interrupt request irq (bsc#1255804).\n- CVE-2023-54311: ext4: fix deadlock when converting an inline directory in nojournal mode (bsc#1255773).\n- CVE-2023-54321: driver core: fix potential null-ptr-deref in device_add() (bsc#1255762).\n- CVE-2024-41007: tcp: use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863).\n- CVE-2025-40115: scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (bsc#1253318).\n- CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).\n- CVE-2025-40261: nvme: nvme-fc: Ensure -\u003eioerr_work is cancelled in nvme_fc_delete_ctrl() (bsc#1254839).\n- CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835).\n- CVE-2025-40271: fs/proc: fix uaf in proc_readdir_de() (bsc#1255297).\n- CVE-2025-40323: fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (bsc#1255094).\n- CVE-2025-40339: drm/amdgpu: fix nullptr err of vm_handle_moved (bsc#1255428).\n- CVE-2025-40345: usb: storage: sddr55: Reject out-of-bound new_pba (bsc#1255279).\n- CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output (bsc#1255102).\n- CVE-2025-68188: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() (bsc#1255269).\n- CVE-2025-68190: drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() (bsc#1255131).\n- CVE-2025-68192: net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (bsc#1255246).\n- CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe (bsc#1255157).\n- CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing incorrect cleanup (bsc#1255268).\n- CVE-2025-68261: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() (bsc#1255164).\n- CVE-2025-68264: ext4: refresh inline data size before write operations (bsc#1255380).\n- CVE-2025-68286: drm/amd/display: Check NULL before accessing (bsc#1255351).\n- CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup (bsc#1255128).\n- CVE-2025-68303: platform/x86: intel: punit_ipc: fix memory corruption (bsc#1255122).\n- CVE-2025-68305: Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (bsc#1255169).\n- CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).\n- CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted (bsc#1255482).\n- CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (bsc#1255544).\n- CVE-2025-68354: regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex (bsc#1255553).\n- CVE-2025-68362: wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb() (bsc#1255611).\n- CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622).\n- CVE-2025-68367: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse (bsc#1255547).\n- CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537).\n- CVE-2025-68379: RDMA/rxe: Fix null deref on srq-\u003erq.queue after resize failure (bsc#1255695).\n- CVE-2025-68740: ima: Handle error code returned by ima_filter_rule_match() (bsc#1255812).\n- CVE-2025-68757: drm/vgem-fence: Fix potential deadlock on release (bsc#1255943).\n- CVE-2025-68767: hfsplus: Verify inode mode when loading from disk (bsc#1256580).\n- CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582).\n- CVE-2025-68774: hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create (bsc#1256585).\n- CVE-2025-68783: ALSA: usb-mixer: us16x08: validate meter packet indices (bsc#1256650).\n- CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for special files (bsc#1256638).\n- CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query (bsc#1256688).\n- CVE-2025-68797: char: applicom: fix NULL pointer dereference in ac_ioctl (bsc#1256660).\n- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).\n- CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters (bsc#1256674).\n- CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for resources (bsc#1256654).\n- CVE-2025-71082: Bluetooth: btusb: revert use of devm_kzalloc in btusb (bsc#1256611).\n- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).\n- CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg() (bsc#1256628).\n- CVE-2025-71091: team: fix check for port enabled in team_queue_override_port_prio_changed() (bsc#1256773).\n- CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777).\n- CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly (bsc#1256606).\n- CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591).\n- CVE-2025-71108: usb: typec: ucsi: Handle incorrect num_connectors capability (bsc#1256774).\n- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).\n- CVE-2025-71119: powerpc/kexec: Enable SMT before waking offline CPUs (bsc#1205462).\n- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).\n- CVE-2026-22976: net_sched: qfq: Fix double list add in class with netem as child qdisc (bsc#1257035).\n- CVE-2026-22978: wifi: avoid kernel-infoleak from struct iw_point (bsc#1257227).\n- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).\n- CVE-2026-23001: macvlan: Use \u0027hash\u0027 iterators to simplify code (bsc#1257232).\n- CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207).\n\nThe following non security issues were fixed:\n\n- RDMA/rxe: Fix the error caused by qp-\u003esk (bsc#1256122).\n- RDMA/srpt: Fix disabling device management (bsc#1255905).\n- RDMA/srpt: Fix handling of SR-IOV and iWARP ports (bsc#1255905).\n- configfs: factor dirent removal into helpers (bsc#1256184).\n- drm/amdgpu: Remove explicit wait after VM validate (bsc#1255428).\n- drm/amdgpu: update mappings not managed by KFD (bsc#1255428).\n- hwrng: amd - Convert PCIBIOS_* return codes to errnos (bsc#1256386).\n- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1255844).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-473,SUSE-SLE-Live-Patching-12-SP5-2026-473,SUSE-SLE-SERVER-12-SP5-LTSS-2026-473,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-473",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0473-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0473-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260473-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0473-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "self",
"summary": "SUSE Bug 1205462",
"url": "https://bugzilla.suse.com/1205462"
},
{
"category": "self",
"summary": "SUSE Bug 1214285",
"url": "https://bugzilla.suse.com/1214285"
},
{
"category": "self",
"summary": "SUSE Bug 1220840",
"url": "https://bugzilla.suse.com/1220840"
},
{
"category": "self",
"summary": "SUSE Bug 1223007",
"url": "https://bugzilla.suse.com/1223007"
},
{
"category": "self",
"summary": "SUSE Bug 1223675",
"url": "https://bugzilla.suse.com/1223675"
},
{
"category": "self",
"summary": "SUSE Bug 1225527",
"url": "https://bugzilla.suse.com/1225527"
},
{
"category": "self",
"summary": "SUSE Bug 1225741",
"url": "https://bugzilla.suse.com/1225741"
},
{
"category": "self",
"summary": "SUSE Bug 1227863",
"url": "https://bugzilla.suse.com/1227863"
},
{
"category": "self",
"summary": "SUSE Bug 1227988",
"url": "https://bugzilla.suse.com/1227988"
},
{
"category": "self",
"summary": "SUSE Bug 1231908",
"url": "https://bugzilla.suse.com/1231908"
},
{
"category": "self",
"summary": "SUSE Bug 1235428",
"url": "https://bugzilla.suse.com/1235428"
},
{
"category": "self",
"summary": "SUSE Bug 1236702",
"url": "https://bugzilla.suse.com/1236702"
},
{
"category": "self",
"summary": "SUSE Bug 1239346",
"url": "https://bugzilla.suse.com/1239346"
},
{
"category": "self",
"summary": "SUSE Bug 1240299",
"url": "https://bugzilla.suse.com/1240299"
},
{
"category": "self",
"summary": "SUSE Bug 1243471",
"url": "https://bugzilla.suse.com/1243471"
},
{
"category": "self",
"summary": "SUSE Bug 1244904",
"url": "https://bugzilla.suse.com/1244904"
},
{
"category": "self",
"summary": "SUSE Bug 1244938",
"url": "https://bugzilla.suse.com/1244938"
},
{
"category": "self",
"summary": "SUSE Bug 1245110",
"url": "https://bugzilla.suse.com/1245110"
},
{
"category": "self",
"summary": "SUSE Bug 1248211",
"url": "https://bugzilla.suse.com/1248211"
},
{
"category": "self",
"summary": "SUSE Bug 1248341",
"url": "https://bugzilla.suse.com/1248341"
},
{
"category": "self",
"summary": "SUSE Bug 1248363",
"url": "https://bugzilla.suse.com/1248363"
},
{
"category": "self",
"summary": "SUSE Bug 1248643",
"url": "https://bugzilla.suse.com/1248643"
},
{
"category": "self",
"summary": "SUSE Bug 1249307",
"url": "https://bugzilla.suse.com/1249307"
},
{
"category": "self",
"summary": "SUSE Bug 1249658",
"url": "https://bugzilla.suse.com/1249658"
},
{
"category": "self",
"summary": "SUSE Bug 1249827",
"url": "https://bugzilla.suse.com/1249827"
},
{
"category": "self",
"summary": "SUSE Bug 1249842",
"url": "https://bugzilla.suse.com/1249842"
},
{
"category": "self",
"summary": "SUSE Bug 1249854",
"url": "https://bugzilla.suse.com/1249854"
},
{
"category": "self",
"summary": "SUSE Bug 1249928",
"url": "https://bugzilla.suse.com/1249928"
},
{
"category": "self",
"summary": "SUSE Bug 1250032",
"url": "https://bugzilla.suse.com/1250032"
},
{
"category": "self",
"summary": "SUSE Bug 1250082",
"url": "https://bugzilla.suse.com/1250082"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250759",
"url": "https://bugzilla.suse.com/1250759"
},
{
"category": "self",
"summary": "SUSE Bug 1250868",
"url": "https://bugzilla.suse.com/1250868"
},
{
"category": "self",
"summary": "SUSE Bug 1251770",
"url": "https://bugzilla.suse.com/1251770"
},
{
"category": "self",
"summary": "SUSE Bug 1252542",
"url": "https://bugzilla.suse.com/1252542"
},
{
"category": "self",
"summary": "SUSE Bug 1252909",
"url": "https://bugzilla.suse.com/1252909"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253739",
"url": "https://bugzilla.suse.com/1253739"
},
{
"category": "self",
"summary": "SUSE Bug 1254244",
"url": "https://bugzilla.suse.com/1254244"
},
{
"category": "self",
"summary": "SUSE Bug 1254572",
"url": "https://bugzilla.suse.com/1254572"
},
{
"category": "self",
"summary": "SUSE Bug 1254657",
"url": "https://bugzilla.suse.com/1254657"
},
{
"category": "self",
"summary": "SUSE Bug 1254673",
"url": "https://bugzilla.suse.com/1254673"
},
{
"category": "self",
"summary": "SUSE Bug 1254689",
"url": "https://bugzilla.suse.com/1254689"
},
{
"category": "self",
"summary": "SUSE Bug 1254707",
"url": "https://bugzilla.suse.com/1254707"
},
{
"category": "self",
"summary": "SUSE Bug 1254835",
"url": "https://bugzilla.suse.com/1254835"
},
{
"category": "self",
"summary": "SUSE Bug 1254839",
"url": "https://bugzilla.suse.com/1254839"
},
{
"category": "self",
"summary": "SUSE Bug 1254845",
"url": "https://bugzilla.suse.com/1254845"
},
{
"category": "self",
"summary": "SUSE Bug 1254986",
"url": "https://bugzilla.suse.com/1254986"
},
{
"category": "self",
"summary": "SUSE Bug 1255094",
"url": "https://bugzilla.suse.com/1255094"
},
{
"category": "self",
"summary": "SUSE Bug 1255102",
"url": "https://bugzilla.suse.com/1255102"
},
{
"category": "self",
"summary": "SUSE Bug 1255122",
"url": "https://bugzilla.suse.com/1255122"
},
{
"category": "self",
"summary": "SUSE Bug 1255128",
"url": "https://bugzilla.suse.com/1255128"
},
{
"category": "self",
"summary": "SUSE Bug 1255131",
"url": "https://bugzilla.suse.com/1255131"
},
{
"category": "self",
"summary": "SUSE Bug 1255157",
"url": "https://bugzilla.suse.com/1255157"
},
{
"category": "self",
"summary": "SUSE Bug 1255164",
"url": "https://bugzilla.suse.com/1255164"
},
{
"category": "self",
"summary": "SUSE Bug 1255169",
"url": "https://bugzilla.suse.com/1255169"
},
{
"category": "self",
"summary": "SUSE Bug 1255171",
"url": "https://bugzilla.suse.com/1255171"
},
{
"category": "self",
"summary": "SUSE Bug 1255246",
"url": "https://bugzilla.suse.com/1255246"
},
{
"category": "self",
"summary": "SUSE Bug 1255268",
"url": "https://bugzilla.suse.com/1255268"
},
{
"category": "self",
"summary": "SUSE Bug 1255269",
"url": "https://bugzilla.suse.com/1255269"
},
{
"category": "self",
"summary": "SUSE Bug 1255279",
"url": "https://bugzilla.suse.com/1255279"
},
{
"category": "self",
"summary": "SUSE Bug 1255297",
"url": "https://bugzilla.suse.com/1255297"
},
{
"category": "self",
"summary": "SUSE Bug 1255351",
"url": "https://bugzilla.suse.com/1255351"
},
{
"category": "self",
"summary": "SUSE Bug 1255380",
"url": "https://bugzilla.suse.com/1255380"
},
{
"category": "self",
"summary": "SUSE Bug 1255428",
"url": "https://bugzilla.suse.com/1255428"
},
{
"category": "self",
"summary": "SUSE Bug 1255482",
"url": "https://bugzilla.suse.com/1255482"
},
{
"category": "self",
"summary": "SUSE Bug 1255537",
"url": "https://bugzilla.suse.com/1255537"
},
{
"category": "self",
"summary": "SUSE Bug 1255544",
"url": "https://bugzilla.suse.com/1255544"
},
{
"category": "self",
"summary": "SUSE Bug 1255547",
"url": "https://bugzilla.suse.com/1255547"
},
{
"category": "self",
"summary": "SUSE Bug 1255553",
"url": "https://bugzilla.suse.com/1255553"
},
{
"category": "self",
"summary": "SUSE Bug 1255565",
"url": "https://bugzilla.suse.com/1255565"
},
{
"category": "self",
"summary": "SUSE Bug 1255571",
"url": "https://bugzilla.suse.com/1255571"
},
{
"category": "self",
"summary": "SUSE Bug 1255594",
"url": "https://bugzilla.suse.com/1255594"
},
{
"category": "self",
"summary": "SUSE Bug 1255611",
"url": "https://bugzilla.suse.com/1255611"
},
{
"category": "self",
"summary": "SUSE Bug 1255622",
"url": "https://bugzilla.suse.com/1255622"
},
{
"category": "self",
"summary": "SUSE Bug 1255695",
"url": "https://bugzilla.suse.com/1255695"
},
{
"category": "self",
"summary": "SUSE Bug 1255762",
"url": "https://bugzilla.suse.com/1255762"
},
{
"category": "self",
"summary": "SUSE Bug 1255773",
"url": "https://bugzilla.suse.com/1255773"
},
{
"category": "self",
"summary": "SUSE Bug 1255804",
"url": "https://bugzilla.suse.com/1255804"
},
{
"category": "self",
"summary": "SUSE Bug 1255810",
"url": "https://bugzilla.suse.com/1255810"
},
{
"category": "self",
"summary": "SUSE Bug 1255812",
"url": "https://bugzilla.suse.com/1255812"
},
{
"category": "self",
"summary": "SUSE Bug 1255839",
"url": "https://bugzilla.suse.com/1255839"
},
{
"category": "self",
"summary": "SUSE Bug 1255844",
"url": "https://bugzilla.suse.com/1255844"
},
{
"category": "self",
"summary": "SUSE Bug 1255874",
"url": "https://bugzilla.suse.com/1255874"
},
{
"category": "self",
"summary": "SUSE Bug 1255880",
"url": "https://bugzilla.suse.com/1255880"
},
{
"category": "self",
"summary": "SUSE Bug 1255905",
"url": "https://bugzilla.suse.com/1255905"
},
{
"category": "self",
"summary": "SUSE Bug 1255908",
"url": "https://bugzilla.suse.com/1255908"
},
{
"category": "self",
"summary": "SUSE Bug 1255925",
"url": "https://bugzilla.suse.com/1255925"
},
{
"category": "self",
"summary": "SUSE Bug 1255939",
"url": "https://bugzilla.suse.com/1255939"
},
{
"category": "self",
"summary": "SUSE Bug 1255943",
"url": "https://bugzilla.suse.com/1255943"
},
{
"category": "self",
"summary": "SUSE Bug 1255961",
"url": "https://bugzilla.suse.com/1255961"
},
{
"category": "self",
"summary": "SUSE Bug 1255970",
"url": "https://bugzilla.suse.com/1255970"
},
{
"category": "self",
"summary": "SUSE Bug 1255983",
"url": "https://bugzilla.suse.com/1255983"
},
{
"category": "self",
"summary": "SUSE Bug 1256038",
"url": "https://bugzilla.suse.com/1256038"
},
{
"category": "self",
"summary": "SUSE Bug 1256058",
"url": "https://bugzilla.suse.com/1256058"
},
{
"category": "self",
"summary": "SUSE Bug 1256106",
"url": "https://bugzilla.suse.com/1256106"
},
{
"category": "self",
"summary": "SUSE Bug 1256122",
"url": "https://bugzilla.suse.com/1256122"
},
{
"category": "self",
"summary": "SUSE Bug 1256125",
"url": "https://bugzilla.suse.com/1256125"
},
{
"category": "self",
"summary": "SUSE Bug 1256127",
"url": "https://bugzilla.suse.com/1256127"
},
{
"category": "self",
"summary": "SUSE Bug 1256130",
"url": "https://bugzilla.suse.com/1256130"
},
{
"category": "self",
"summary": "SUSE Bug 1256131",
"url": "https://bugzilla.suse.com/1256131"
},
{
"category": "self",
"summary": "SUSE Bug 1256132",
"url": "https://bugzilla.suse.com/1256132"
},
{
"category": "self",
"summary": "SUSE Bug 1256149",
"url": "https://bugzilla.suse.com/1256149"
},
{
"category": "self",
"summary": "SUSE Bug 1256155",
"url": "https://bugzilla.suse.com/1256155"
},
{
"category": "self",
"summary": "SUSE Bug 1256165",
"url": "https://bugzilla.suse.com/1256165"
},
{
"category": "self",
"summary": "SUSE Bug 1256168",
"url": "https://bugzilla.suse.com/1256168"
},
{
"category": "self",
"summary": "SUSE Bug 1256184",
"url": "https://bugzilla.suse.com/1256184"
},
{
"category": "self",
"summary": "SUSE Bug 1256191",
"url": "https://bugzilla.suse.com/1256191"
},
{
"category": "self",
"summary": "SUSE Bug 1256216",
"url": "https://bugzilla.suse.com/1256216"
},
{
"category": "self",
"summary": "SUSE Bug 1256219",
"url": "https://bugzilla.suse.com/1256219"
},
{
"category": "self",
"summary": "SUSE Bug 1256221",
"url": "https://bugzilla.suse.com/1256221"
},
{
"category": "self",
"summary": "SUSE Bug 1256229",
"url": "https://bugzilla.suse.com/1256229"
},
{
"category": "self",
"summary": "SUSE Bug 1256258",
"url": "https://bugzilla.suse.com/1256258"
},
{
"category": "self",
"summary": "SUSE Bug 1256267",
"url": "https://bugzilla.suse.com/1256267"
},
{
"category": "self",
"summary": "SUSE Bug 1256282",
"url": "https://bugzilla.suse.com/1256282"
},
{
"category": "self",
"summary": "SUSE Bug 1256305",
"url": "https://bugzilla.suse.com/1256305"
},
{
"category": "self",
"summary": "SUSE Bug 1256320",
"url": "https://bugzilla.suse.com/1256320"
},
{
"category": "self",
"summary": "SUSE Bug 1256354",
"url": "https://bugzilla.suse.com/1256354"
},
{
"category": "self",
"summary": "SUSE Bug 1256369",
"url": "https://bugzilla.suse.com/1256369"
},
{
"category": "self",
"summary": "SUSE Bug 1256386",
"url": "https://bugzilla.suse.com/1256386"
},
{
"category": "self",
"summary": "SUSE Bug 1256395",
"url": "https://bugzilla.suse.com/1256395"
},
{
"category": "self",
"summary": "SUSE Bug 1256398",
"url": "https://bugzilla.suse.com/1256398"
},
{
"category": "self",
"summary": "SUSE Bug 1256580",
"url": "https://bugzilla.suse.com/1256580"
},
{
"category": "self",
"summary": "SUSE Bug 1256582",
"url": "https://bugzilla.suse.com/1256582"
},
{
"category": "self",
"summary": "SUSE Bug 1256585",
"url": "https://bugzilla.suse.com/1256585"
},
{
"category": "self",
"summary": "SUSE Bug 1256591",
"url": "https://bugzilla.suse.com/1256591"
},
{
"category": "self",
"summary": "SUSE Bug 1256606",
"url": "https://bugzilla.suse.com/1256606"
},
{
"category": "self",
"summary": "SUSE Bug 1256611",
"url": "https://bugzilla.suse.com/1256611"
},
{
"category": "self",
"summary": "SUSE Bug 1256623",
"url": "https://bugzilla.suse.com/1256623"
},
{
"category": "self",
"summary": "SUSE Bug 1256628",
"url": "https://bugzilla.suse.com/1256628"
},
{
"category": "self",
"summary": "SUSE Bug 1256638",
"url": "https://bugzilla.suse.com/1256638"
},
{
"category": "self",
"summary": "SUSE Bug 1256641",
"url": "https://bugzilla.suse.com/1256641"
},
{
"category": "self",
"summary": "SUSE Bug 1256650",
"url": "https://bugzilla.suse.com/1256650"
},
{
"category": "self",
"summary": "SUSE Bug 1256654",
"url": "https://bugzilla.suse.com/1256654"
},
{
"category": "self",
"summary": "SUSE Bug 1256660",
"url": "https://bugzilla.suse.com/1256660"
},
{
"category": "self",
"summary": "SUSE Bug 1256674",
"url": "https://bugzilla.suse.com/1256674"
},
{
"category": "self",
"summary": "SUSE Bug 1256688",
"url": "https://bugzilla.suse.com/1256688"
},
{
"category": "self",
"summary": "SUSE Bug 1256726",
"url": "https://bugzilla.suse.com/1256726"
},
{
"category": "self",
"summary": "SUSE Bug 1256730",
"url": "https://bugzilla.suse.com/1256730"
},
{
"category": "self",
"summary": "SUSE Bug 1256757",
"url": "https://bugzilla.suse.com/1256757"
},
{
"category": "self",
"summary": "SUSE Bug 1256773",
"url": "https://bugzilla.suse.com/1256773"
},
{
"category": "self",
"summary": "SUSE Bug 1256774",
"url": "https://bugzilla.suse.com/1256774"
},
{
"category": "self",
"summary": "SUSE Bug 1256777",
"url": "https://bugzilla.suse.com/1256777"
},
{
"category": "self",
"summary": "SUSE Bug 1256779",
"url": "https://bugzilla.suse.com/1256779"
},
{
"category": "self",
"summary": "SUSE Bug 1256792",
"url": "https://bugzilla.suse.com/1256792"
},
{
"category": "self",
"summary": "SUSE Bug 1257035",
"url": "https://bugzilla.suse.com/1257035"
},
{
"category": "self",
"summary": "SUSE Bug 1257207",
"url": "https://bugzilla.suse.com/1257207"
},
{
"category": "self",
"summary": "SUSE Bug 1257227",
"url": "https://bugzilla.suse.com/1257227"
},
{
"category": "self",
"summary": "SUSE Bug 1257229",
"url": "https://bugzilla.suse.com/1257229"
},
{
"category": "self",
"summary": "SUSE Bug 1257232",
"url": "https://bugzilla.suse.com/1257232"
},
{
"category": "self",
"summary": "SUSE Bug 1257236",
"url": "https://bugzilla.suse.com/1257236"
},
{
"category": "self",
"summary": "SUSE Bug 1257282",
"url": "https://bugzilla.suse.com/1257282"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48838 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49943 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49943/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49980 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50347 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50347/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50580 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50676 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50697 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50697/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50709 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50716 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50716/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50717 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50717/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50719 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50740 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50744 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50749 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50749/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50751 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50751/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50760 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50770 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50777 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50780 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50780/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50782 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50782/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50786 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50816 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50834 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50834/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50865 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50865/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50868 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50880 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50881 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50884 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50885 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50887 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-50756 page",
"url": "https://www.suse.com/security/cve/CVE-2023-50756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52525 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52525/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52999 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53148 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53178 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53226 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53226/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53464 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53464/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53685 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53747 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53751 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53751/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53825 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53825/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53853 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53863 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53863/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53992 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53992/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54012 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54047 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54048 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54067 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54067/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54111 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54112 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54118 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54121 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54134 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54198 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54202 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54207 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54218 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54230 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54243 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54243/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54265 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54274 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54274/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54282 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54287 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54287/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54311 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-54321 page",
"url": "https://www.suse.com/security/cve/CVE-2023-54321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26832 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26832/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26935 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26935/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36903 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-41007 page",
"url": "https://www.suse.com/security/cve/CVE-2024-41007/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50040 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56690 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56690/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-58020 page",
"url": "https://www.suse.com/security/cve/CVE-2024-58020/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21681 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21681/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38007 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38007/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38539 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38591 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38602 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38656 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39689 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39689/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39813 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39829 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40088 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40259 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40259/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40261 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40264 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40271 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40323 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40339 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40345 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40363 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68190 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68241 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68241/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68245 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68245/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68261 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68264 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68286 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68296 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68303 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68305 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68305/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68312 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68337 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68349 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68354 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68354/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68362 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68366 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68367 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68367/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68372 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68379 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68740 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68757 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68767 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68771 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68774 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68783 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68783/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68795 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68797 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68797/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68813 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68816 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71082 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71091 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71093 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71096 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71108 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71112 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71123 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22976 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22978 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22988 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22988/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22999 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23001 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23011 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23011/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-02-12T11:26:33Z",
"generator": {
"date": "2026-02-12T11:26:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0473-1",
"initial_release_date": "2026-02-12T11:26:33Z",
"revision_history": [
{
"date": "2026-02-12T11:26:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.293.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.293.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.293.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.293.1.aarch64",
"product_id": "kernel-default-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.293.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.293.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.293.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.293.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.293.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.293.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.293.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.293.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.293.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.293.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.293.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.293.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.293.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.293.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.293.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.293.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.293.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.293.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.293.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.293.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.293.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.293.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.293.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.293.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.293.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.293.1.noarch",
"product_id": "kernel-devel-4.12.14-122.293.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.293.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.293.1.noarch",
"product_id": "kernel-docs-4.12.14-122.293.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.293.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.293.1.noarch",
"product_id": "kernel-docs-html-4.12.14-122.293.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.293.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.293.1.noarch",
"product_id": "kernel-macros-4.12.14-122.293.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.293.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.293.1.noarch",
"product_id": "kernel-source-4.12.14-122.293.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.293.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.293.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.293.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.293.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.293.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.293.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.293.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.293.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.293.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.293.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.293.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.293.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.293.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.293.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.293.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.293.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.293.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.293.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.293.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.293.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.293.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.293.1.s390x",
"product_id": "kernel-default-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.293.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.293.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.293.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.293.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.293.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.293.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.293.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.293.1.s390x",
"product_id": "kernel-syms-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.293.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.293.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.293.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.293.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.293.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.293.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.293.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.293.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.293.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.293.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.293.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.293.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.293.1.x86_64",
"product_id": "kernel-default-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.293.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.293.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.293.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.293.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.293.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.293.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.293.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.293.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.293.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.293.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.293.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.293.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.293.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.293.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.293.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.293.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.293.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.293.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.293.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.293.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.293.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.293.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.293.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.293.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.293.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.293.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.293.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.293.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.293.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.293.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.293.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.293.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.293.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.293.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.293.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.293.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.293.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.293.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.293.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.293.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.293.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.293.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.293.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.293.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.293.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.293.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.293.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.293.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.293.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.293.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.293.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.293.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.293.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.293.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.293.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.293.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.293.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.293.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.293.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.293.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.293.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.293.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.293.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.293.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.293.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.293.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.293.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.293.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.293.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.293.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.293.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.293.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.293.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.293.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-48838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48838"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: Fix use-after-free bug by not setting udc-\u003edev.driver\n\nThe syzbot fuzzer found a use-after-free bug:\n\nBUG: KASAN: use-after-free in dev_uevent+0x712/0x780 drivers/base/core.c:2320\nRead of size 8 at addr ffff88802b934098 by task udevd/3689\n\nCPU: 2 PID: 3689 Comm: udevd Not tainted 5.17.0-rc4-syzkaller-00229-g4f12b742eb2b #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0x8d/0x303 mm/kasan/report.c:255\n __kasan_report mm/kasan/report.c:442 [inline]\n kasan_report.cold+0x83/0xdf mm/kasan/report.c:459\n dev_uevent+0x712/0x780 drivers/base/core.c:2320\n uevent_show+0x1b8/0x380 drivers/base/core.c:2391\n dev_attr_show+0x4b/0x90 drivers/base/core.c:2094\n\nAlthough the bug manifested in the driver core, the real cause was a\nrace with the gadget core. dev_uevent() does:\n\n\tif (dev-\u003edriver)\n\t\tadd_uevent_var(env, \"DRIVER=%s\", dev-\u003edriver-\u003ename);\n\nand between the test and the dereference of dev-\u003edriver, the gadget\ncore sets dev-\u003edriver to NULL.\n\nThe race wouldn\u0027t occur if the gadget core registered its devices on\na real bus, using the standard synchronization techniques of the\ndriver core. However, it\u0027s not necessary to make such a large change\nin order to fix this bug; all we need to do is make sure that\nudc-\u003edev.driver is always NULL.\n\nIn fact, there is no reason for udc-\u003edev.driver ever to be set to\nanything, let alone to the value it currently gets: the address of the\ngadget\u0027s driver. After all, a gadget driver only knows how to manage\na gadget, not how to manage a UDC.\n\nThis patch simply removes the statements in the gadget core that touch\nudc-\u003edev.driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48838",
"url": "https://www.suse.com/security/cve/CVE-2022-48838"
},
{
"category": "external",
"summary": "SUSE Bug 1227988 for CVE-2022-48838",
"url": "https://bugzilla.suse.com/1227988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48838"
},
{
"cve": "CVE-2022-49943",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49943"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: gadget: Fix obscure lockdep violation for udc_mutex\n\nA recent commit expanding the scope of the udc_lock mutex in the\ngadget core managed to cause an obscure and slightly bizarre lockdep\nviolation. In abbreviated form:\n\n======================================================\nWARNING: possible circular locking dependency detected\n5.19.0-rc7+ #12510 Not tainted\n------------------------------------------------------\nudevadm/312 is trying to acquire lock:\nffff80000aae1058 (udc_lock){+.+.}-{3:3}, at: usb_udc_uevent+0x54/0xe0\n\nbut task is already holding lock:\nffff000002277548 (kn-\u003eactive#4){++++}-{0:0}, at: kernfs_seq_start+0x34/0xe0\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-\u003e #3 (kn-\u003eactive#4){++++}-{0:0}:\n lock_acquire+0x68/0x84\n __kernfs_remove+0x268/0x380\n kernfs_remove_by_name_ns+0x58/0xac\n sysfs_remove_file_ns+0x18/0x24\n device_del+0x15c/0x440\n\n-\u003e #2 (device_links_lock){+.+.}-{3:3}:\n lock_acquire+0x68/0x84\n __mutex_lock+0x9c/0x430\n mutex_lock_nested+0x38/0x64\n device_link_remove+0x3c/0xa0\n _regulator_put.part.0+0x168/0x190\n regulator_put+0x3c/0x54\n devm_regulator_release+0x14/0x20\n\n-\u003e #1 (regulator_list_mutex){+.+.}-{3:3}:\n lock_acquire+0x68/0x84\n __mutex_lock+0x9c/0x430\n mutex_lock_nested+0x38/0x64\n regulator_lock_dependent+0x54/0x284\n regulator_enable+0x34/0x80\n phy_power_on+0x24/0x130\n __dwc2_lowlevel_hw_enable+0x100/0x130\n dwc2_lowlevel_hw_enable+0x18/0x40\n dwc2_hsotg_udc_start+0x6c/0x2f0\n gadget_bind_driver+0x124/0x1f4\n\n-\u003e #0 (udc_lock){+.+.}-{3:3}:\n __lock_acquire+0x1298/0x20cc\n lock_acquire.part.0+0xe0/0x230\n lock_acquire+0x68/0x84\n __mutex_lock+0x9c/0x430\n mutex_lock_nested+0x38/0x64\n usb_udc_uevent+0x54/0xe0\n\nEvidently this was caused by the scope of udc_mutex being too large.\nThe mutex is only meant to protect udc-\u003edriver along with a few other\nthings. As far as I can tell, there\u0027s no reason for the mutex to be\nheld while the gadget core calls a gadget driver\u0027s -\u003ebind or -\u003eunbind\nroutine, or while a UDC is being started or stopped. (This accounts\nfor link #1 in the chain above, where the mutex is held while the\ndwc2_hsotg_udc is started as part of driver probing.)\n\nGadget drivers\u0027 -\u003edisconnect callbacks are problematic. Even though\nusb_gadget_disconnect() will now acquire the udc_mutex, there\u0027s a\nwindow in usb_gadget_bind_driver() between the times when the mutex is\nreleased and the -\u003ebind callback is invoked. If a disconnect occurred\nduring that window, we could call the driver\u0027s -\u003edisconnect routine\nbefore its -\u003ebind routine. To prevent this from happening, it will be\nnecessary to prevent a UDC from connecting while it has no gadget\ndriver. This should be done already but it doesn\u0027t seem to be;\ncurrently usb_gadget_connect() has no check for this. Such a check\nwill have to be added later.\n\nSome degree of mutual exclusion is required in soft_connect_store(),\nwhich can dereference udc-\u003edriver at arbitrary times since it is a\nsysfs callback. The solution here is to acquire the gadget\u0027s device\nlock rather than the udc_mutex. Since the driver core guarantees that\nthe device lock is always held during driver binding and unbinding,\nthis will make the accesses in soft_connect_store() mutually exclusive\nwith any changes to udc-\u003edriver.\n\nLastly, it turns out there is one place which should hold the\nudc_mutex but currently does not: The function_show() routine needs\nprotection while it dereferences udc-\u003edriver. The missing lock and\nunlock calls are added.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49943",
"url": "https://www.suse.com/security/cve/CVE-2022-49943"
},
{
"category": "external",
"summary": "SUSE Bug 1244904 for CVE-2022-49943",
"url": "https://bugzilla.suse.com/1244904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-49943"
},
{
"cve": "CVE-2022-49980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: gadget: Fix use-after-free Read in usb_udc_uevent()\n\nThe syzbot fuzzer found a race between uevent callbacks and gadget\ndriver unregistration that can cause a use-after-free bug:\n\n---------------------------------------------------------------\nBUG: KASAN: use-after-free in usb_udc_uevent+0x11f/0x130\ndrivers/usb/gadget/udc/core.c:1732\nRead of size 8 at addr ffff888078ce2050 by task udevd/2968\n\nCPU: 1 PID: 2968 Comm: udevd Not tainted 5.19.0-rc4-next-20220628-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google\n06/29/2022\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:317 [inline]\n print_report.cold+0x2ba/0x719 mm/kasan/report.c:433\n kasan_report+0xbe/0x1f0 mm/kasan/report.c:495\n usb_udc_uevent+0x11f/0x130 drivers/usb/gadget/udc/core.c:1732\n dev_uevent+0x290/0x770 drivers/base/core.c:2424\n---------------------------------------------------------------\n\nThe bug occurs because usb_udc_uevent() dereferences udc-\u003edriver but\ndoes so without acquiring the udc_lock mutex, which protects this\nfield. If the gadget driver is unbound from the udc concurrently with\nuevent processing, the driver structure may be accessed after it has\nbeen deallocated.\n\nTo prevent the race, we make sure that the routine holds the mutex\naround the racing accesses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49980",
"url": "https://www.suse.com/security/cve/CVE-2022-49980"
},
{
"category": "external",
"summary": "SUSE Bug 1245110 for CVE-2022-49980",
"url": "https://bugzilla.suse.com/1245110"
},
{
"category": "external",
"summary": "SUSE Bug 1245111 for CVE-2022-49980",
"url": "https://bugzilla.suse.com/1245111"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "important"
}
],
"title": "CVE-2022-49980"
},
{
"cve": "CVE-2022-50347",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50347"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: rtsx_usb_sdmmc: fix return value check of mmc_add_host()\n\nmmc_add_host() may return error, if we ignore its return value, the memory\nthat allocated in mmc_alloc_host() will be leaked and it will lead a kernel\ncrash because of deleting not added device in the remove path.\n\nSo fix this by checking the return value and calling mmc_free_host() in the\nerror path, besides, led_classdev_unregister() and pm_runtime_disable() also\nneed be called.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50347",
"url": "https://www.suse.com/security/cve/CVE-2022-50347"
},
{
"category": "external",
"summary": "SUSE Bug 1249928 for CVE-2022-50347",
"url": "https://bugzilla.suse.com/1249928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50347"
},
{
"cve": "CVE-2022-50580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50580"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-throttle: prevent overflow while calculating wait time\n\nThere is a problem found by code review in tg_with_in_bps_limit() that\n\u0027bps_limit * jiffy_elapsed_rnd\u0027 might overflow. Fix the problem by\ncalling mul_u64_u64_div_u64() instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50580",
"url": "https://www.suse.com/security/cve/CVE-2022-50580"
},
{
"category": "external",
"summary": "SUSE Bug 1252542 for CVE-2022-50580",
"url": "https://bugzilla.suse.com/1252542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50580"
},
{
"cve": "CVE-2022-50676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: rds: don\u0027t hold sock lock when cancelling work from rds_tcp_reset_callbacks()\n\nsyzbot is reporting lockdep warning at rds_tcp_reset_callbacks() [1], for\ncommit ac3615e7f3cffe2a (\"RDS: TCP: Reduce code duplication in\nrds_tcp_reset_callbacks()\") added cancel_delayed_work_sync() into a section\nprotected by lock_sock() without realizing that rds_send_xmit() might call\nlock_sock().\n\nWe don\u0027t need to protect cancel_delayed_work_sync() using lock_sock(), for\neven if rds_{send,recv}_worker() re-queued this work while __flush_work()\n from cancel_delayed_work_sync() was waiting for this work to complete,\nretried rds_{send,recv}_worker() is no-op due to the absence of RDS_CONN_UP\nbit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50676",
"url": "https://www.suse.com/security/cve/CVE-2022-50676"
},
{
"category": "external",
"summary": "SUSE Bug 1254689 for CVE-2022-50676",
"url": "https://bugzilla.suse.com/1254689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50676"
},
{
"cve": "CVE-2022-50697",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50697"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmrp: introduce active flags to prevent UAF when applicant uninit\n\nThe caller of del_timer_sync must prevent restarting of the timer, If\nwe have no this synchronization, there is a small probability that the\ncancellation will not be successful.\n\nAnd syzbot report the fellowing crash:\n==================================================================\nBUG: KASAN: use-after-free in hlist_add_head include/linux/list.h:929 [inline]\nBUG: KASAN: use-after-free in enqueue_timer+0x18/0xa4 kernel/time/timer.c:605\nWrite at addr f9ff000024df6058 by task syz-fuzzer/2256\nPointer tag: [f9], memory tag: [fe]\n\nCPU: 1 PID: 2256 Comm: syz-fuzzer Not tainted 6.1.0-rc5-syzkaller-00008-\nge01d50cbd6ee #0\nHardware name: linux,dummy-virt (DT)\nCall trace:\n dump_backtrace.part.0+0xe0/0xf0 arch/arm64/kernel/stacktrace.c:156\n dump_backtrace arch/arm64/kernel/stacktrace.c:162 [inline]\n show_stack+0x18/0x40 arch/arm64/kernel/stacktrace.c:163\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x68/0x84 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:284 [inline]\n print_report+0x1a8/0x4a0 mm/kasan/report.c:395\n kasan_report+0x94/0xb4 mm/kasan/report.c:495\n __do_kernel_fault+0x164/0x1e0 arch/arm64/mm/fault.c:320\n do_bad_area arch/arm64/mm/fault.c:473 [inline]\n do_tag_check_fault+0x78/0x8c arch/arm64/mm/fault.c:749\n do_mem_abort+0x44/0x94 arch/arm64/mm/fault.c:825\n el1_abort+0x40/0x60 arch/arm64/kernel/entry-common.c:367\n el1h_64_sync_handler+0xd8/0xe4 arch/arm64/kernel/entry-common.c:427\n el1h_64_sync+0x64/0x68 arch/arm64/kernel/entry.S:576\n hlist_add_head include/linux/list.h:929 [inline]\n enqueue_timer+0x18/0xa4 kernel/time/timer.c:605\n mod_timer+0x14/0x20 kernel/time/timer.c:1161\n mrp_periodic_timer_arm net/802/mrp.c:614 [inline]\n mrp_periodic_timer+0xa0/0xc0 net/802/mrp.c:627\n call_timer_fn.constprop.0+0x24/0x80 kernel/time/timer.c:1474\n expire_timers+0x98/0xc4 kernel/time/timer.c:1519\n\nTo fix it, we can introduce a new active flags to make sure the timer will\nnot restart.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50697",
"url": "https://www.suse.com/security/cve/CVE-2022-50697"
},
{
"category": "external",
"summary": "SUSE Bug 1255594 for CVE-2022-50697",
"url": "https://bugzilla.suse.com/1255594"
},
{
"category": "external",
"summary": "SUSE Bug 1255595 for CVE-2022-50697",
"url": "https://bugzilla.suse.com/1255595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "important"
}
],
"title": "CVE-2022-50697"
},
{
"cve": "CVE-2022-50709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50709"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()\n\nsyzbot is reporting uninit value at ath9k_htc_rx_msg() [1], for\nioctl(USB_RAW_IOCTL_EP_WRITE) can call ath9k_hif_usb_rx_stream() with\npkt_len = 0 but ath9k_hif_usb_rx_stream() uses\n__dev_alloc_skb(pkt_len + 32, GFP_ATOMIC) based on an assumption that\npkt_len is valid. As a result, ath9k_hif_usb_rx_stream() allocates skb\nwith uninitialized memory and ath9k_htc_rx_msg() is reading from\nuninitialized memory.\n\nSince bytes accessed by ath9k_htc_rx_msg() is not known until\nath9k_htc_rx_msg() is called, it would be difficult to check minimal valid\npkt_len at \"if (pkt_len \u003e 2 * MAX_RX_BUF_SIZE) {\" line in\nath9k_hif_usb_rx_stream().\n\nWe have two choices. One is to workaround by adding __GFP_ZERO so that\nath9k_htc_rx_msg() sees 0 if pkt_len is invalid. The other is to let\nath9k_htc_rx_msg() validate pkt_len before accessing. This patch chose\nthe latter.\n\nNote that I\u0027m not sure threshold condition is correct, for I can\u0027t find\ndetails on possible packet length used by this protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50709",
"url": "https://www.suse.com/security/cve/CVE-2022-50709"
},
{
"category": "external",
"summary": "SUSE Bug 1255565 for CVE-2022-50709",
"url": "https://bugzilla.suse.com/1255565"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50709"
},
{
"cve": "CVE-2022-50716",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50716"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ar5523: Fix use-after-free on ar5523_cmd() timed out\n\nsyzkaller reported use-after-free with the stack trace like below [1]:\n\n[ 38.960489][ C3] ==================================================================\n[ 38.963216][ C3] BUG: KASAN: use-after-free in ar5523_cmd_tx_cb+0x220/0x240\n[ 38.964950][ C3] Read of size 8 at addr ffff888048e03450 by task swapper/3/0\n[ 38.966363][ C3]\n[ 38.967053][ C3] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 6.0.0-09039-ga6afa4199d3d-dirty #18\n[ 38.968464][ C3] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-1.fc36 04/01/2014\n[ 38.969959][ C3] Call Trace:\n[ 38.970841][ C3] \u003cIRQ\u003e\n[ 38.971663][ C3] dump_stack_lvl+0xfc/0x174\n[ 38.972620][ C3] print_report.cold+0x2c3/0x752\n[ 38.973626][ C3] ? ar5523_cmd_tx_cb+0x220/0x240\n[ 38.974644][ C3] kasan_report+0xb1/0x1d0\n[ 38.975720][ C3] ? ar5523_cmd_tx_cb+0x220/0x240\n[ 38.976831][ C3] ar5523_cmd_tx_cb+0x220/0x240\n[ 38.978412][ C3] __usb_hcd_giveback_urb+0x353/0x5b0\n[ 38.979755][ C3] usb_hcd_giveback_urb+0x385/0x430\n[ 38.981266][ C3] dummy_timer+0x140c/0x34e0\n[ 38.982925][ C3] ? notifier_call_chain+0xb5/0x1e0\n[ 38.984761][ C3] ? rcu_read_lock_sched_held+0xb/0x60\n[ 38.986242][ C3] ? lock_release+0x51c/0x790\n[ 38.987323][ C3] ? _raw_read_unlock_irqrestore+0x37/0x70\n[ 38.988483][ C3] ? __wake_up_common_lock+0xde/0x130\n[ 38.989621][ C3] ? reacquire_held_locks+0x4a0/0x4a0\n[ 38.990777][ C3] ? lock_acquire+0x472/0x550\n[ 38.991919][ C3] ? rcu_read_lock_sched_held+0xb/0x60\n[ 38.993138][ C3] ? lock_acquire+0x472/0x550\n[ 38.994890][ C3] ? dummy_urb_enqueue+0x860/0x860\n[ 38.996266][ C3] ? do_raw_spin_unlock+0x16f/0x230\n[ 38.997670][ C3] ? dummy_urb_enqueue+0x860/0x860\n[ 38.999116][ C3] call_timer_fn+0x1a0/0x6a0\n[ 39.000668][ C3] ? add_timer_on+0x4a0/0x4a0\n[ 39.002137][ C3] ? reacquire_held_locks+0x4a0/0x4a0\n[ 39.003809][ C3] ? __next_timer_interrupt+0x226/0x2a0\n[ 39.005509][ C3] __run_timers.part.0+0x69a/0xac0\n[ 39.007025][ C3] ? dummy_urb_enqueue+0x860/0x860\n[ 39.008716][ C3] ? call_timer_fn+0x6a0/0x6a0\n[ 39.010254][ C3] ? cpuacct_percpu_seq_show+0x10/0x10\n[ 39.011795][ C3] ? kvm_sched_clock_read+0x14/0x40\n[ 39.013277][ C3] ? sched_clock_cpu+0x69/0x2b0\n[ 39.014724][ C3] run_timer_softirq+0xb6/0x1d0\n[ 39.016196][ C3] __do_softirq+0x1d2/0x9be\n[ 39.017616][ C3] __irq_exit_rcu+0xeb/0x190\n[ 39.019004][ C3] irq_exit_rcu+0x5/0x20\n[ 39.020361][ C3] sysvec_apic_timer_interrupt+0x8f/0xb0\n[ 39.021965][ C3] \u003c/IRQ\u003e\n[ 39.023237][ C3] \u003cTASK\u003e\n\nIn ar5523_probe(), ar5523_host_available() calls ar5523_cmd() as below\n(there are other functions which finally call ar5523_cmd()):\n\nar5523_probe()\n-\u003e ar5523_host_available()\n -\u003e ar5523_cmd_read()\n -\u003e ar5523_cmd()\n\nIf ar5523_cmd() timed out, then ar5523_host_available() failed and\nar5523_probe() freed the device structure. So, ar5523_cmd_tx_cb()\nmight touch the freed structure.\n\nThis patch fixes this issue by canceling in-flight tx cmd if submitted\nurb timed out.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50716",
"url": "https://www.suse.com/security/cve/CVE-2022-50716"
},
{
"category": "external",
"summary": "SUSE Bug 1255839 for CVE-2022-50716",
"url": "https://bugzilla.suse.com/1255839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50716"
},
{
"cve": "CVE-2022-50717",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50717"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: add bounds check on Transfer Tag\n\nttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(),\nadd a bounds check to avoid out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50717",
"url": "https://www.suse.com/security/cve/CVE-2022-50717"
},
{
"category": "external",
"summary": "SUSE Bug 1255844 for CVE-2022-50717",
"url": "https://bugzilla.suse.com/1255844"
},
{
"category": "external",
"summary": "SUSE Bug 1255845 for CVE-2022-50717",
"url": "https://bugzilla.suse.com/1255845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "important"
}
],
"title": "CVE-2022-50717"
},
{
"cve": "CVE-2022-50719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50719"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: line6: fix stack overflow in line6_midi_transmit\n\nCorrectly calculate available space including the size of the chunk\nbuffer. This fixes a buffer overflow when multiple MIDI sysex\nmessages are sent to a PODxt device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50719",
"url": "https://www.suse.com/security/cve/CVE-2022-50719"
},
{
"category": "external",
"summary": "SUSE Bug 1255939 for CVE-2022-50719",
"url": "https://bugzilla.suse.com/1255939"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50719"
},
{
"cve": "CVE-2022-50740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50740"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: hif_usb: fix memory leak of urbs in ath9k_hif_usb_dealloc_tx_urbs()\n\nSyzkaller reports a long-known leak of urbs in\nath9k_hif_usb_dealloc_tx_urbs().\n\nThe cause of the leak is that usb_get_urb() is called but usb_free_urb()\n(or usb_put_urb()) is not called inside usb_kill_urb() as urb-\u003edev or\nurb-\u003eep fields have not been initialized and usb_kill_urb() returns\nimmediately.\n\nThe patch removes trying to kill urbs located in hif_dev-\u003etx.tx_buf\nbecause hif_dev-\u003etx.tx_buf is not supposed to contain urbs which are in\npending state (the pending urbs are stored in hif_dev-\u003etx.tx_pending).\nThe tx.tx_lock is acquired so there should not be any changes in the list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50740",
"url": "https://www.suse.com/security/cve/CVE-2022-50740"
},
{
"category": "external",
"summary": "SUSE Bug 1256155 for CVE-2022-50740",
"url": "https://bugzilla.suse.com/1256155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50740"
},
{
"cve": "CVE-2022-50744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50744"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs\n\nDuring I/O and simultaneous cat of /sys/kernel/debug/lpfc/fnX/rx_monitor, a\nhard lockup similar to the call trace below may occur.\n\nThe spin_lock_bh in lpfc_rx_monitor_report is not protecting from timer\ninterrupts as expected, so change the strength of the spin lock to _irq.\n\nKernel panic - not syncing: Hard LOCKUP\nCPU: 3 PID: 110402 Comm: cat Kdump: loaded\n\nexception RIP: native_queued_spin_lock_slowpath+91\n\n[IRQ stack]\n native_queued_spin_lock_slowpath at ffffffffb814e30b\n _raw_spin_lock at ffffffffb89a667a\n lpfc_rx_monitor_record at ffffffffc0a73a36 [lpfc]\n lpfc_cmf_timer at ffffffffc0abbc67 [lpfc]\n __hrtimer_run_queues at ffffffffb8184250\n hrtimer_interrupt at ffffffffb8184ab0\n smp_apic_timer_interrupt at ffffffffb8a026ba\n apic_timer_interrupt at ffffffffb8a01c4f\n[End of IRQ stack]\n\n apic_timer_interrupt at ffffffffb8a01c4f\n lpfc_rx_monitor_report at ffffffffc0a73c80 [lpfc]\n lpfc_rx_monitor_read at ffffffffc0addde1 [lpfc]\n full_proxy_read at ffffffffb83e7fc3\n vfs_read at ffffffffb833fe71\n ksys_read at ffffffffb83402af\n do_syscall_64 at ffffffffb800430b\n entry_SYSCALL_64_after_hwframe at ffffffffb8a000ad",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50744",
"url": "https://www.suse.com/security/cve/CVE-2022-50744"
},
{
"category": "external",
"summary": "SUSE Bug 1256165 for CVE-2022-50744",
"url": "https://bugzilla.suse.com/1256165"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50744"
},
{
"cve": "CVE-2022-50749",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50749"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nacct: fix potential integer overflow in encode_comp_t()\n\nThe integer overflow is descripted with following codes:\n \u003e 317 static comp_t encode_comp_t(u64 value)\n \u003e 318 {\n \u003e 319 int exp, rnd;\n ......\n \u003e 341 exp \u003c\u003c= MANTSIZE;\n \u003e 342 exp += value;\n \u003e 343 return exp;\n \u003e 344 }\n\nCurrently comp_t is defined as type of \u0027__u16\u0027, but the variable \u0027exp\u0027 is\ntype of \u0027int\u0027, so overflow would happen when variable \u0027exp\u0027 in line 343 is\ngreater than 65535.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50749",
"url": "https://www.suse.com/security/cve/CVE-2022-50749"
},
{
"category": "external",
"summary": "SUSE Bug 1256191 for CVE-2022-50749",
"url": "https://bugzilla.suse.com/1256191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "low"
}
],
"title": "CVE-2022-50749"
},
{
"cve": "CVE-2022-50751",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50751"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nconfigfs: fix possible memory leak in configfs_create_dir()\n\nkmemleak reported memory leaks in configfs_create_dir():\n\nunreferenced object 0xffff888009f6af00 (size 192):\n comm \"modprobe\", pid 3777, jiffies 4295537735 (age 233.784s)\n backtrace:\n kmem_cache_alloc (mm/slub.c:3250 mm/slub.c:3256 mm/slub.c:3263 mm/slub.c:3273)\n new_fragment (./include/linux/slab.h:600 fs/configfs/dir.c:163)\n configfs_register_subsystem (fs/configfs/dir.c:1857)\n basic_write (drivers/hwtracing/stm/p_basic.c:14) stm_p_basic\n do_one_initcall (init/main.c:1296)\n do_init_module (kernel/module/main.c:2455)\n ...\n\nunreferenced object 0xffff888003ba7180 (size 96):\n comm \"modprobe\", pid 3777, jiffies 4295537735 (age 233.784s)\n backtrace:\n kmem_cache_alloc (mm/slub.c:3250 mm/slub.c:3256 mm/slub.c:3263 mm/slub.c:3273)\n configfs_new_dirent (./include/linux/slab.h:723 fs/configfs/dir.c:194)\n configfs_make_dirent (fs/configfs/dir.c:248)\n configfs_create_dir (fs/configfs/dir.c:296)\n configfs_attach_group.isra.28 (fs/configfs/dir.c:816 fs/configfs/dir.c:852)\n configfs_register_subsystem (fs/configfs/dir.c:1881)\n basic_write (drivers/hwtracing/stm/p_basic.c:14) stm_p_basic\n do_one_initcall (init/main.c:1296)\n do_init_module (kernel/module/main.c:2455)\n ...\n\nThis is because the refcount is not correct in configfs_make_dirent().\nFor normal stage, the refcount is changing as:\n\nconfigfs_register_subsystem()\n configfs_create_dir()\n configfs_make_dirent()\n configfs_new_dirent() # set s_count = 1\n dentry-\u003ed_fsdata = configfs_get(sd); # s_count = 2\n...\nconfigfs_unregister_subsystem()\n configfs_remove_dir()\n remove_dir()\n configfs_remove_dirent() # s_count = 1\n dput() ...\n *dentry_unlink_inode()*\n configfs_d_iput() # s_count = 0, release\n\nHowever, if we failed in configfs_create():\n\nconfigfs_register_subsystem()\n configfs_create_dir()\n configfs_make_dirent() # s_count = 2\n ...\n configfs_create() # fail\n -\u003eout_remove:\n configfs_remove_dirent(dentry)\n configfs_put(sd) # s_count = 1\n return PTR_ERR(inode);\n\nThere is no inode in the error path, so the configfs_d_iput() is lost\nand makes sd and fragment memory leaked.\n\nTo fix this, when we failed in configfs_create(), manually call\nconfigfs_put(sd) to keep the refcount correct.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50751",
"url": "https://www.suse.com/security/cve/CVE-2022-50751"
},
{
"category": "external",
"summary": "SUSE Bug 1256184 for CVE-2022-50751",
"url": "https://bugzilla.suse.com/1256184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "low"
}
],
"title": "CVE-2022-50751"
},
{
"cve": "CVE-2022-50760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50760"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios()\n\nAs comment of pci_get_class() says, it returns a pci_device with its\nrefcount increased and decreased the refcount for the input parameter\n@from if it is not NULL.\n\nIf we break the loop in amdgpu_atrm_get_bios() with \u0027pdev\u0027 not NULL, we\nneed to call pci_dev_put() to decrease the refcount. Add the missing\npci_dev_put() to avoid refcount leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50760",
"url": "https://www.suse.com/security/cve/CVE-2022-50760"
},
{
"category": "external",
"summary": "SUSE Bug 1255983 for CVE-2022-50760",
"url": "https://bugzilla.suse.com/1255983"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50760"
},
{
"cve": "CVE-2022-50770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50770"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix memory leak in ocfs2_mount_volume()\n\nThere is a memory leak reported by kmemleak:\n\n unreferenced object 0xffff88810cc65e60 (size 32):\n comm \"mount.ocfs2\", pid 23753, jiffies 4302528942 (age 34735.105s)\n hex dump (first 32 bytes):\n 10 00 00 00 00 00 00 00 00 01 01 01 01 01 01 01 ................\n 01 01 01 01 01 01 01 01 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003cffffffff8170f73d\u003e] __kmalloc+0x4d/0x150\n [\u003cffffffffa0ac3f51\u003e] ocfs2_compute_replay_slots+0x121/0x330 [ocfs2]\n [\u003cffffffffa0b65165\u003e] ocfs2_check_volume+0x485/0x900 [ocfs2]\n [\u003cffffffffa0b68129\u003e] ocfs2_mount_volume.isra.0+0x1e9/0x650 [ocfs2]\n [\u003cffffffffa0b7160b\u003e] ocfs2_fill_super+0xe0b/0x1740 [ocfs2]\n [\u003cffffffff818e1fe2\u003e] mount_bdev+0x312/0x400\n [\u003cffffffff819a086d\u003e] legacy_get_tree+0xed/0x1d0\n [\u003cffffffff818de82d\u003e] vfs_get_tree+0x7d/0x230\n [\u003cffffffff81957f92\u003e] path_mount+0xd62/0x1760\n [\u003cffffffff81958a5a\u003e] do_mount+0xca/0xe0\n [\u003cffffffff81958d3c\u003e] __x64_sys_mount+0x12c/0x1a0\n [\u003cffffffff82f26f15\u003e] do_syscall_64+0x35/0x80\n [\u003cffffffff8300006a\u003e] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis call stack is related to two problems. Firstly, the ocfs2 super uses\n\"replay_map\" to trace online/offline slots, in order to recover offline\nslots during recovery and mount. But when ocfs2_truncate_log_init()\nreturns an error in ocfs2_mount_volume(), the memory of \"replay_map\" will\nnot be freed in error handling path. Secondly, the memory of \"replay_map\"\nwill not be freed if d_make_root() returns an error in ocfs2_fill_super().\nBut the memory of \"replay_map\" will be freed normally when completing\nrecovery and mount in ocfs2_complete_mount_recovery().\n\nFix the first problem by adding error handling path to free \"replay_map\"\nwhen ocfs2_truncate_log_init() fails. And fix the second problem by\ncalling ocfs2_free_replay_slots(osb) in the error handling path\n\"out_dismount\". In addition, since ocfs2_free_replay_slots() is static,\nit is necessary to remove its static attribute and declare it in header\nfile.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50770",
"url": "https://www.suse.com/security/cve/CVE-2022-50770"
},
{
"category": "external",
"summary": "SUSE Bug 1256221 for CVE-2022-50770",
"url": "https://bugzilla.suse.com/1256221"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50770"
},
{
"cve": "CVE-2022-50777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50777"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe\n\nof_phy_find_device() return device node with refcount incremented.\nCall put_device() to relese it when not needed anymore.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50777",
"url": "https://www.suse.com/security/cve/CVE-2022-50777"
},
{
"category": "external",
"summary": "SUSE Bug 1256320 for CVE-2022-50777",
"url": "https://bugzilla.suse.com/1256320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50777"
},
{
"cve": "CVE-2022-50780",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50780"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed\n\nWhen the ops_init() interface is invoked to initialize the net, but\nops-\u003einit() fails, data is released. However, the ptr pointer in\nnet-\u003egen is invalid. In this case, when nfqnl_nf_hook_drop() is invoked\nto release the net, invalid address access occurs.\n\nThe process is as follows:\nsetup_net()\n\tops_init()\n\t\tdata = kzalloc(...) ---\u003e alloc \"data\"\n\t\tnet_assign_generic() ---\u003e assign \"date\" to ptr in net-\u003egen\n\t\t...\n\t\tops-\u003einit() ---\u003e failed\n\t\t...\n\t\tkfree(data); ---\u003e ptr in net-\u003egen is invalid\n\t...\n\tops_exit_list()\n\t\t...\n\t\tnfqnl_nf_hook_drop()\n\t\t\t*q = nfnl_queue_pernet(net) ---\u003e q is invalid\n\nThe following is the Call Trace information:\nBUG: KASAN: use-after-free in nfqnl_nf_hook_drop+0x264/0x280\nRead of size 8 at addr ffff88810396b240 by task ip/15855\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x8e/0xd1\nprint_report+0x155/0x454\nkasan_report+0xba/0x1f0\nnfqnl_nf_hook_drop+0x264/0x280\nnf_queue_nf_hook_drop+0x8b/0x1b0\n__nf_unregister_net_hook+0x1ae/0x5a0\nnf_unregister_net_hooks+0xde/0x130\nops_exit_list+0xb0/0x170\nsetup_net+0x7ac/0xbd0\ncopy_net_ns+0x2e6/0x6b0\ncreate_new_namespaces+0x382/0xa50\nunshare_nsproxy_namespaces+0xa6/0x1c0\nksys_unshare+0x3a4/0x7e0\n__x64_sys_unshare+0x2d/0x40\ndo_syscall_64+0x35/0x80\nentry_SYSCALL_64_after_hwframe+0x46/0xb0\n\u003c/TASK\u003e\n\nAllocated by task 15855:\nkasan_save_stack+0x1e/0x40\nkasan_set_track+0x21/0x30\n__kasan_kmalloc+0xa1/0xb0\n__kmalloc+0x49/0xb0\nops_init+0xe7/0x410\nsetup_net+0x5aa/0xbd0\ncopy_net_ns+0x2e6/0x6b0\ncreate_new_namespaces+0x382/0xa50\nunshare_nsproxy_namespaces+0xa6/0x1c0\nksys_unshare+0x3a4/0x7e0\n__x64_sys_unshare+0x2d/0x40\ndo_syscall_64+0x35/0x80\nentry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nFreed by task 15855:\nkasan_save_stack+0x1e/0x40\nkasan_set_track+0x21/0x30\nkasan_save_free_info+0x2a/0x40\n____kasan_slab_free+0x155/0x1b0\nslab_free_freelist_hook+0x11b/0x220\n__kmem_cache_free+0xa4/0x360\nops_init+0xb9/0x410\nsetup_net+0x5aa/0xbd0\ncopy_net_ns+0x2e6/0x6b0\ncreate_new_namespaces+0x382/0xa50\nunshare_nsproxy_namespaces+0xa6/0x1c0\nksys_unshare+0x3a4/0x7e0\n__x64_sys_unshare+0x2d/0x40\ndo_syscall_64+0x35/0x80\nentry_SYSCALL_64_after_hwframe+0x46/0xb0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50780",
"url": "https://www.suse.com/security/cve/CVE-2022-50780"
},
{
"category": "external",
"summary": "SUSE Bug 1256305 for CVE-2022-50780",
"url": "https://bugzilla.suse.com/1256305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50780"
},
{
"cve": "CVE-2022-50782",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50782"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug_on in __es_tree_search caused by bad quota inode\n\nWe got a issue as fllows:\n==================================================================\n kernel BUG at fs/ext4/extents_status.c:202!\n invalid opcode: 0000 [#1] PREEMPT SMP\n CPU: 1 PID: 810 Comm: mount Not tainted 6.1.0-rc1-next-g9631525255e3 #352\n RIP: 0010:__es_tree_search.isra.0+0xb8/0xe0\n RSP: 0018:ffffc90001227900 EFLAGS: 00010202\n RAX: 0000000000000000 RBX: 0000000077512a0f RCX: 0000000000000000\n RDX: 0000000000000002 RSI: 0000000000002a10 RDI: ffff8881004cd0c8\n RBP: ffff888177512ac8 R08: 47ffffffffffffff R09: 0000000000000001\n R10: 0000000000000001 R11: 00000000000679af R12: 0000000000002a10\n R13: ffff888177512d88 R14: 0000000077512a10 R15: 0000000000000000\n FS: 00007f4bd76dbc40(0000)GS:ffff88842fd00000(0000)knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00005653bf993cf8 CR3: 000000017bfdf000 CR4: 00000000000006e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \u003cTASK\u003e\n ext4_es_cache_extent+0xe2/0x210\n ext4_cache_extents+0xd2/0x110\n ext4_find_extent+0x5d5/0x8c0\n ext4_ext_map_blocks+0x9c/0x1d30\n ext4_map_blocks+0x431/0xa50\n ext4_getblk+0x82/0x340\n ext4_bread+0x14/0x110\n ext4_quota_read+0xf0/0x180\n v2_read_header+0x24/0x90\n v2_check_quota_file+0x2f/0xa0\n dquot_load_quota_sb+0x26c/0x760\n dquot_load_quota_inode+0xa5/0x190\n ext4_enable_quotas+0x14c/0x300\n __ext4_fill_super+0x31cc/0x32c0\n ext4_fill_super+0x115/0x2d0\n get_tree_bdev+0x1d2/0x360\n ext4_get_tree+0x19/0x30\n vfs_get_tree+0x26/0xe0\n path_mount+0x81d/0xfc0\n do_mount+0x8d/0xc0\n __x64_sys_mount+0xc0/0x160\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n \u003c/TASK\u003e\n==================================================================\n\nAbove issue may happen as follows:\n-------------------------------------\next4_fill_super\n ext4_orphan_cleanup\n ext4_enable_quotas\n ext4_quota_enable\n ext4_iget --\u003e get error inode \u003c5\u003e\n ext4_ext_check_inode --\u003e Wrong imode makes it escape inspection\n make_bad_inode(inode) --\u003e EXT4_BOOT_LOADER_INO set imode\n dquot_load_quota_inode\n vfs_setup_quota_inode --\u003e check pass\n dquot_load_quota_sb\n v2_check_quota_file\n v2_read_header\n ext4_quota_read\n ext4_bread\n ext4_getblk\n ext4_map_blocks\n ext4_ext_map_blocks\n ext4_find_extent\n ext4_cache_extents\n ext4_es_cache_extent\n __es_tree_search.isra.0\n ext4_es_end --\u003e Wrong extents trigger BUG_ON\n\nIn the above issue, s_usr_quota_inum is set to 5, but inode\u003c5\u003e contains\nincorrect imode and disordered extents. Because 5 is EXT4_BOOT_LOADER_INO,\nthe ext4_ext_check_inode check in the ext4_iget function can be bypassed,\nfinally, the extents that are not checked trigger the BUG_ON in the\n__es_tree_search function. To solve this issue, check whether the inode is\nbad_inode in vfs_setup_quota_inode().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50782",
"url": "https://www.suse.com/security/cve/CVE-2022-50782"
},
{
"category": "external",
"summary": "SUSE Bug 1256282 for CVE-2022-50782",
"url": "https://bugzilla.suse.com/1256282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50782"
},
{
"cve": "CVE-2022-50786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50786"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: s5p-mfc: Clear workbit to handle error condition\n\nDuring error on CLOSE_INSTANCE command, ctx_work_bits was not getting\ncleared. During consequent mfc execution NULL pointer dereferencing of\nthis context led to kernel panic. This patch fixes this issue by making\nsure to clear ctx_work_bits always.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50786",
"url": "https://www.suse.com/security/cve/CVE-2022-50786"
},
{
"category": "external",
"summary": "SUSE Bug 1256258 for CVE-2022-50786",
"url": "https://bugzilla.suse.com/1256258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50786"
},
{
"cve": "CVE-2022-50816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50816"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: ensure sane device mtu in tunnels\n\nAnother syzbot report [1] with no reproducer hints\nat a bug in ip6_gre tunnel (dev:ip6gretap0)\n\nSince ipv6 mcast code makes sure to read dev-\u003emtu once\nand applies a sanity check on it (see commit b9b312a7a451\n\"ipv6: mcast: better catch silly mtu values\"), a remaining\npossibility is that a layer is able to set dev-\u003emtu to\nan underflowed value (high order bit set).\n\nThis could happen indeed in ip6gre_tnl_link_config_route(),\nip6_tnl_link_config() and ipip6_tunnel_bind_dev()\n\nMake sure to sanitize mtu value in a local variable before\nit is written once on dev-\u003emtu, as lockless readers could\ncatch wrong temporary value.\n\n[1]\nskbuff: skb_over_panic: text:ffff80000b7a2f38 len:40 put:40 head:ffff000149dcf200 data:ffff000149dcf2b0 tail:0xd8 end:0xc0 dev:ip6gretap0\n------------[ cut here ]------------\nkernel BUG at net/core/skbuff.c:120\nInternal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\nModules linked in:\nCPU: 1 PID: 10241 Comm: kworker/1:1 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022\nWorkqueue: mld mld_ifc_work\npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : skb_panic+0x4c/0x50 net/core/skbuff.c:116\nlr : skb_panic+0x4c/0x50 net/core/skbuff.c:116\nsp : ffff800020dd3b60\nx29: ffff800020dd3b70 x28: 0000000000000000 x27: ffff00010df2a800\nx26: 00000000000000c0 x25: 00000000000000b0 x24: ffff000149dcf200\nx23: 00000000000000c0 x22: 00000000000000d8 x21: ffff80000b7a2f38\nx20: ffff00014c2f7800 x19: 0000000000000028 x18: 00000000000001a9\nx17: 0000000000000000 x16: ffff80000db49158 x15: ffff000113bf1a80\nx14: 0000000000000000 x13: 00000000ffffffff x12: ffff000113bf1a80\nx11: ff808000081c0d5c x10: 0000000000000000 x9 : 73f125dc5c63ba00\nx8 : 73f125dc5c63ba00 x7 : ffff800008161d1c x6 : 0000000000000000\nx5 : 0000000000000080 x4 : 0000000000000001 x3 : 0000000000000000\nx2 : ffff0001fefddcd0 x1 : 0000000100000000 x0 : 0000000000000089\nCall trace:\nskb_panic+0x4c/0x50 net/core/skbuff.c:116\nskb_over_panic net/core/skbuff.c:125 [inline]\nskb_put+0xd4/0xdc net/core/skbuff.c:2049\nip6_mc_hdr net/ipv6/mcast.c:1714 [inline]\nmld_newpack+0x14c/0x270 net/ipv6/mcast.c:1765\nadd_grhead net/ipv6/mcast.c:1851 [inline]\nadd_grec+0xa20/0xae0 net/ipv6/mcast.c:1989\nmld_send_cr+0x438/0x5a8 net/ipv6/mcast.c:2115\nmld_ifc_work+0x38/0x290 net/ipv6/mcast.c:2653\nprocess_one_work+0x2d8/0x504 kernel/workqueue.c:2289\nworker_thread+0x340/0x610 kernel/workqueue.c:2436\nkthread+0x12c/0x158 kernel/kthread.c:376\nret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860\nCode: 91011400 aa0803e1 a90027ea 94373093 (d4210000)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50816",
"url": "https://www.suse.com/security/cve/CVE-2022-50816"
},
{
"category": "external",
"summary": "SUSE Bug 1256038 for CVE-2022-50816",
"url": "https://bugzilla.suse.com/1256038"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50816"
},
{
"cve": "CVE-2022-50834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50834"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: Fix potential resource leaks\n\nnfc_get_device() take reference for the device, add missing\nnfc_put_device() to release it when not need anymore.\nAlso fix the style warnning by use error EOPNOTSUPP instead of\nENOTSUPP.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50834",
"url": "https://www.suse.com/security/cve/CVE-2022-50834"
},
{
"category": "external",
"summary": "SUSE Bug 1256219 for CVE-2022-50834",
"url": "https://bugzilla.suse.com/1256219"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50834"
},
{
"cve": "CVE-2022-50865",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50865"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix a signed-integer-overflow bug in tcp_add_backlog()\n\nThe type of sk_rcvbuf and sk_sndbuf in struct sock is int, and\nin tcp_add_backlog(), the variable limit is caculated by adding\nsk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value\nof int and overflow. This patch reduces the limit budget by\nhalving the sndbuf to solve this issue since ACK packets are much\nsmaller than the payload.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50865",
"url": "https://www.suse.com/security/cve/CVE-2022-50865"
},
{
"category": "external",
"summary": "SUSE Bug 1256168 for CVE-2022-50865",
"url": "https://bugzilla.suse.com/1256168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50865"
},
{
"cve": "CVE-2022-50868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50868"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: amd - Fix PCI device refcount leak\n\nfor_each_pci_dev() is implemented by pci_get_device(). The comment of\npci_get_device() says that it will increase the reference count for the\nreturned pci_dev and also decrease the reference count for the input\npci_dev @from if it is not NULL.\n\nIf we break for_each_pci_dev() loop with pdev not NULL, we need to call\npci_dev_put() to decrease the reference count. Add the missing\npci_dev_put() for the normal and error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50868",
"url": "https://www.suse.com/security/cve/CVE-2022-50868"
},
{
"category": "external",
"summary": "SUSE Bug 1256386 for CVE-2022-50868",
"url": "https://bugzilla.suse.com/1256386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50868"
},
{
"cve": "CVE-2022-50880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50880"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()\n\nWhen peer delete failed in a disconnect operation, use-after-free\ndetected by KFENCE in below log. It is because for each vdev_id and\naddress, it has only one struct ath10k_peer, it is allocated in\nath10k_peer_map_event(). When connected to an AP, it has more than\none HTT_T2H_MSG_TYPE_PEER_MAP reported from firmware, then the\narray peer_map of struct ath10k will be set muti-elements to the\nsame ath10k_peer in ath10k_peer_map_event(). When peer delete failed\nin ath10k_sta_state(), the ath10k_peer will be free for the 1st peer\nid in array peer_map of struct ath10k, and then use-after-free happened\nfor the 2nd peer id because they map to the same ath10k_peer.\n\nAnd clean up all peers in array peer_map for the ath10k_peer, then\nuser-after-free disappeared\n\npeer map event log:\n[ 306.911021] wlan0: authenticate with b0:2a:43:e6:75:0e\n[ 306.957187] ath10k_pci 0000:01:00.0: mac vdev 0 peer create b0:2a:43:e6:75:0e (new sta) sta 1 / 32 peer 1 / 33\n[ 306.957395] ath10k_pci 0000:01:00.0: htt peer map vdev 0 peer b0:2a:43:e6:75:0e id 246\n[ 306.957404] ath10k_pci 0000:01:00.0: htt peer map vdev 0 peer b0:2a:43:e6:75:0e id 198\n[ 306.986924] ath10k_pci 0000:01:00.0: htt peer map vdev 0 peer b0:2a:43:e6:75:0e id 166\n\npeer unmap event log:\n[ 435.715691] wlan0: deauthenticating from b0:2a:43:e6:75:0e by local choice (Reason: 3=DEAUTH_LEAVING)\n[ 435.716802] ath10k_pci 0000:01:00.0: mac vdev 0 peer delete b0:2a:43:e6:75:0e sta ffff990e0e9c2b50 (sta gone)\n[ 435.717177] ath10k_pci 0000:01:00.0: htt peer unmap vdev 0 peer b0:2a:43:e6:75:0e id 246\n[ 435.717186] ath10k_pci 0000:01:00.0: htt peer unmap vdev 0 peer b0:2a:43:e6:75:0e id 198\n[ 435.717193] ath10k_pci 0000:01:00.0: htt peer unmap vdev 0 peer b0:2a:43:e6:75:0e id 166\n\nuse-after-free log:\n[21705.888627] wlan0: deauthenticating from d0:76:8f:82:be:75 by local choice (Reason: 3=DEAUTH_LEAVING)\n[21713.799910] ath10k_pci 0000:01:00.0: failed to delete peer d0:76:8f:82:be:75 for vdev 0: -110\n[21713.799925] ath10k_pci 0000:01:00.0: found sta peer d0:76:8f:82:be:75 (ptr 0000000000000000 id 102) entry on vdev 0 after it was supposedly removed\n[21713.799968] ==================================================================\n[21713.799991] BUG: KFENCE: use-after-free read in ath10k_sta_state+0x265/0xb8a [ath10k_core]\n[21713.799991]\n[21713.799997] Use-after-free read at 0x00000000abe1c75e (in kfence-#69):\n[21713.800010] ath10k_sta_state+0x265/0xb8a [ath10k_core]\n[21713.800041] drv_sta_state+0x115/0x677 [mac80211]\n[21713.800059] __sta_info_destroy_part2+0xb1/0x133 [mac80211]\n[21713.800076] __sta_info_flush+0x11d/0x162 [mac80211]\n[21713.800093] ieee80211_set_disassoc+0x12d/0x2f4 [mac80211]\n[21713.800110] ieee80211_mgd_deauth+0x26c/0x29b [mac80211]\n[21713.800137] cfg80211_mlme_deauth+0x13f/0x1bb [cfg80211]\n[21713.800153] nl80211_deauthenticate+0xf8/0x121 [cfg80211]\n[21713.800161] genl_rcv_msg+0x38e/0x3be\n[21713.800166] netlink_rcv_skb+0x89/0xf7\n[21713.800171] genl_rcv+0x28/0x36\n[21713.800176] netlink_unicast+0x179/0x24b\n[21713.800181] netlink_sendmsg+0x3a0/0x40e\n[21713.800187] sock_sendmsg+0x72/0x76\n[21713.800192] ____sys_sendmsg+0x16d/0x1e3\n[21713.800196] ___sys_sendmsg+0x95/0xd1\n[21713.800200] __sys_sendmsg+0x85/0xbf\n[21713.800205] do_syscall_64+0x43/0x55\n[21713.800210] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n[21713.800213]\n[21713.800219] kfence-#69: 0x000000009149b0d5-0x000000004c0697fb, size=1064, cache=kmalloc-2k\n[21713.800219]\n[21713.800224] allocated by task 13 on cpu 0 at 21705.501373s:\n[21713.800241] ath10k_peer_map_event+0x7e/0x154 [ath10k_core]\n[21713.800254] ath10k_htt_t2h_msg_handler+0x586/0x1039 [ath10k_core]\n[21713.800265] ath10k_htt_htc_t2h_msg_handler+0x12/0x28 [ath10k_core]\n[21713.800277] ath10k_htc_rx_completion_handler+0x14c/0x1b5 [ath10k_core]\n[21713.800283] ath10k_pci_process_rx_cb+0x195/0x1d\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50880",
"url": "https://www.suse.com/security/cve/CVE-2022-50880"
},
{
"category": "external",
"summary": "SUSE Bug 1256132 for CVE-2022-50880",
"url": "https://bugzilla.suse.com/1256132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50880"
},
{
"cve": "CVE-2022-50881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50881"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect()\n\nThis patch fixes a use-after-free in ath9k that occurs in\nath9k_hif_usb_disconnect() when ath9k_destroy_wmi() is trying to access\n\u0027drv_priv\u0027 that has already been freed by ieee80211_free_hw(), called by\nath9k_htc_hw_deinit(). The patch moves ath9k_destroy_wmi() before\nieee80211_free_hw(). Note that urbs from the driver should be killed\nbefore freeing \u0027wmi\u0027 with ath9k_destroy_wmi() as their callbacks will\naccess \u0027wmi\u0027.\n\nFound by a modified version of syzkaller.\n\n==================================================================\nBUG: KASAN: use-after-free in ath9k_destroy_wmi+0x38/0x40\nRead of size 8 at addr ffff8881069132a0 by task kworker/0:1/7\n\nCPU: 0 PID: 7 Comm: kworker/0:1 Tainted: G O 5.14.0+ #131\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n dump_stack_lvl+0x8e/0xd1\n print_address_description.constprop.0.cold+0x93/0x334\n ? ath9k_destroy_wmi+0x38/0x40\n ? ath9k_destroy_wmi+0x38/0x40\n kasan_report.cold+0x83/0xdf\n ? ath9k_destroy_wmi+0x38/0x40\n ath9k_destroy_wmi+0x38/0x40\n ath9k_hif_usb_disconnect+0x329/0x3f0\n ? ath9k_hif_usb_suspend+0x120/0x120\n ? usb_disable_interface+0xfc/0x180\n usb_unbind_interface+0x19b/0x7e0\n ? usb_autoresume_device+0x50/0x50\n device_release_driver_internal+0x44d/0x520\n bus_remove_device+0x2e5/0x5a0\n device_del+0x5b2/0xe30\n ? __device_link_del+0x370/0x370\n ? usb_remove_ep_devs+0x43/0x80\n ? remove_intf_ep_devs+0x112/0x1a0\n usb_disable_device+0x1e3/0x5a0\n usb_disconnect+0x267/0x870\n hub_event+0x168d/0x3950\n ? rcu_read_lock_sched_held+0xa1/0xd0\n ? hub_port_debounce+0x2e0/0x2e0\n ? check_irq_usage+0x860/0xf20\n ? drain_workqueue+0x281/0x360\n ? lock_release+0x640/0x640\n ? rcu_read_lock_sched_held+0xa1/0xd0\n ? rcu_read_lock_bh_held+0xb0/0xb0\n ? lockdep_hardirqs_on_prepare+0x273/0x3e0\n process_one_work+0x92b/0x1460\n ? pwq_dec_nr_in_flight+0x330/0x330\n ? rwlock_bug.part.0+0x90/0x90\n worker_thread+0x95/0xe00\n ? __kthread_parkme+0x115/0x1e0\n ? process_one_work+0x1460/0x1460\n kthread+0x3a1/0x480\n ? set_kthread_struct+0x120/0x120\n ret_from_fork+0x1f/0x30\n\nThe buggy address belongs to the page:\npage:ffffea00041a44c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106913\nflags: 0x200000000000000(node=0|zone=2)\nraw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000\nraw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 3, migratetype Unmovable, gfp_mask 0x40dc0(GFP_KERNEL|__GFP_COMP|__GFP_ZERO), pid 7, ts 38347963444, free_ts 41399957635\n prep_new_page+0x1aa/0x240\n get_page_from_freelist+0x159a/0x27c0\n __alloc_pages+0x2da/0x6a0\n alloc_pages+0xec/0x1e0\n kmalloc_order+0x39/0xf0\n kmalloc_order_trace+0x19/0x120\n __kmalloc+0x308/0x390\n wiphy_new_nm+0x6f5/0x1dd0\n ieee80211_alloc_hw_nm+0x36d/0x2230\n ath9k_htc_probe_device+0x9d/0x1e10\n ath9k_htc_hw_init+0x34/0x50\n ath9k_hif_usb_firmware_cb+0x25f/0x4e0\n request_firmware_work_func+0x131/0x240\n process_one_work+0x92b/0x1460\n worker_thread+0x95/0xe00\n kthread+0x3a1/0x480\npage last free stack trace:\n free_pcp_prepare+0x3d3/0x7f0\n free_unref_page+0x1e/0x3d0\n device_release+0xa4/0x240\n kobject_put+0x186/0x4c0\n put_device+0x20/0x30\n ath9k_htc_disconnect_device+0x1cf/0x2c0\n ath9k_htc_hw_deinit+0x26/0x30\n ath9k_hif_usb_disconnect+0x2d9/0x3f0\n usb_unbind_interface+0x19b/0x7e0\n device_release_driver_internal+0x44d/0x520\n bus_remove_device+0x2e5/0x5a0\n device_del+0x5b2/0xe30\n usb_disable_device+0x1e3/0x5a0\n usb_disconnect+0x267/0x870\n hub_event+0x168d/0x3950\n process_one_work+0x92b/0x1460\n\nMemory state around the buggy address:\n ffff888106913180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n ffff888106913200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n\u003effff888\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50881",
"url": "https://www.suse.com/security/cve/CVE-2022-50881"
},
{
"category": "external",
"summary": "SUSE Bug 1256130 for CVE-2022-50881",
"url": "https://bugzilla.suse.com/1256130"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50881"
},
{
"cve": "CVE-2022-50884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50884"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: Prevent drm_copy_field() to attempt copying a NULL pointer\n\nThere are some struct drm_driver fields that are required by drivers since\ndrm_copy_field() attempts to copy them to user-space via DRM_IOCTL_VERSION.\n\nBut it can be possible that a driver has a bug and did not set some of the\nfields, which leads to drm_copy_field() attempting to copy a NULL pointer:\n\n[ +10.395966] Unable to handle kernel access to user memory outside uaccess routines at virtual address 0000000000000000\n[ +0.010955] Mem abort info:\n[ +0.002835] ESR = 0x0000000096000004\n[ +0.003872] EC = 0x25: DABT (current EL), IL = 32 bits\n[ +0.005395] SET = 0, FnV = 0\n[ +0.003113] EA = 0, S1PTW = 0\n[ +0.003182] FSC = 0x04: level 0 translation fault\n[ +0.004964] Data abort info:\n[ +0.002919] ISV = 0, ISS = 0x00000004\n[ +0.003886] CM = 0, WnR = 0\n[ +0.003040] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000115dad000\n[ +0.006536] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[ +0.006925] Internal error: Oops: 96000004 [#1] SMP\n...\n[ +0.011113] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ +0.007061] pc : __pi_strlen+0x14/0x150\n[ +0.003895] lr : drm_copy_field+0x30/0x1a4\n[ +0.004156] sp : ffff8000094b3a50\n[ +0.003355] x29: ffff8000094b3a50 x28: ffff8000094b3b70 x27: 0000000000000040\n[ +0.007242] x26: ffff443743c2ba00 x25: 0000000000000000 x24: 0000000000000040\n[ +0.007243] x23: ffff443743c2ba00 x22: ffff8000094b3b70 x21: 0000000000000000\n[ +0.007241] x20: 0000000000000000 x19: ffff8000094b3b90 x18: 0000000000000000\n[ +0.007241] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaab14b9af40\n[ +0.007241] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ +0.007239] x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa524ad67d4d8\n[ +0.007242] x8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : 6c6e6263606e7141\n[ +0.007239] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n[ +0.007241] x2 : 0000000000000000 x1 : ffff8000094b3b90 x0 : 0000000000000000\n[ +0.007240] Call trace:\n[ +0.002475] __pi_strlen+0x14/0x150\n[ +0.003537] drm_version+0x84/0xac\n[ +0.003448] drm_ioctl_kernel+0xa8/0x16c\n[ +0.003975] drm_ioctl+0x270/0x580\n[ +0.003448] __arm64_sys_ioctl+0xb8/0xfc\n[ +0.003978] invoke_syscall+0x78/0x100\n[ +0.003799] el0_svc_common.constprop.0+0x4c/0xf4\n[ +0.004767] do_el0_svc+0x38/0x4c\n[ +0.003357] el0_svc+0x34/0x100\n[ +0.003185] el0t_64_sync_handler+0x11c/0x150\n[ +0.004418] el0t_64_sync+0x190/0x194\n[ +0.003716] Code: 92402c04 b200c3e8 f13fc09f 5400088c (a9400c02)\n[ +0.006180] ---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50884",
"url": "https://www.suse.com/security/cve/CVE-2022-50884"
},
{
"category": "external",
"summary": "SUSE Bug 1256127 for CVE-2022-50884",
"url": "https://bugzilla.suse.com/1256127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50884"
},
{
"cve": "CVE-2022-50885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50885"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when socket create failed\n\nThere is a null-ptr-deref when mount.cifs over rdma:\n\n BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe]\n Read of size 8 at addr 0000000000000018 by task mount.cifs/3046\n\n CPU: 2 PID: 3046 Comm: mount.cifs Not tainted 6.1.0-rc5+ #62\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc3\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x34/0x44\n kasan_report+0xad/0x130\n rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe]\n execute_in_process_context+0x25/0x90\n __rxe_cleanup+0x101/0x1d0 [rdma_rxe]\n rxe_create_qp+0x16a/0x180 [rdma_rxe]\n create_qp.part.0+0x27d/0x340\n ib_create_qp_kernel+0x73/0x160\n rdma_create_qp+0x100/0x230\n _smbd_get_connection+0x752/0x20f0\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe root cause of the issue is the socket create failed in\nrxe_qp_init_req().\n\nSo move the reset rxe_qp_do_cleanup() after the NULL ptr check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50885",
"url": "https://www.suse.com/security/cve/CVE-2022-50885"
},
{
"category": "external",
"summary": "SUSE Bug 1256122 for CVE-2022-50885",
"url": "https://bugzilla.suse.com/1256122"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50885"
},
{
"cve": "CVE-2022-50887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50887"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: core: fix unbalanced of node refcount in regulator_dev_lookup()\n\nI got the the following report:\n\n OF: ERROR: memory leak, expected refcount 1 instead of 2,\n of_node_get()/of_node_put() unbalanced - destroy cset entry:\n attach overlay node /i2c/pmic@62/regulators/exten\n\nIn of_get_regulator(), the node is returned from of_parse_phandle()\nwith refcount incremented, after using it, of_node_put() need be called.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50887",
"url": "https://www.suse.com/security/cve/CVE-2022-50887"
},
{
"category": "external",
"summary": "SUSE Bug 1256125 for CVE-2022-50887",
"url": "https://bugzilla.suse.com/1256125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-50887"
},
{
"cve": "CVE-2023-50756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-50756"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-50756",
"url": "https://www.suse.com/security/cve/CVE-2023-50756"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "important"
}
],
"title": "CVE-2023-50756"
},
{
"cve": "CVE-2023-52525",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52525"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet\n\nOnly skip the code path trying to access the rfc1042 headers when the\nbuffer is too small, so the driver can still process packets without\nrfc1042 headers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52525",
"url": "https://www.suse.com/security/cve/CVE-2023-52525"
},
{
"category": "external",
"summary": "SUSE Bug 1220840 for CVE-2023-52525",
"url": "https://bugzilla.suse.com/1220840"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52525"
},
{
"cve": "CVE-2023-52999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52999"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix UaF in netns ops registration error path\n\nIf net_assign_generic() fails, the current error path in ops_init() tries\nto clear the gen pointer slot. Anyway, in such error path, the gen pointer\nitself has not been modified yet, and the existing and accessed one is\nsmaller than the accessed index, causing an out-of-bounds error:\n\n BUG: KASAN: slab-out-of-bounds in ops_init+0x2de/0x320\n Write of size 8 at addr ffff888109124978 by task modprobe/1018\n\n CPU: 2 PID: 1018 Comm: modprobe Not tainted 6.2.0-rc2.mptcp_ae5ac65fbed5+ #1641\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.1-2.fc37 04/01/2014\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6a/0x9f\n print_address_description.constprop.0+0x86/0x2b5\n print_report+0x11b/0x1fb\n kasan_report+0x87/0xc0\n ops_init+0x2de/0x320\n register_pernet_operations+0x2e4/0x750\n register_pernet_subsys+0x24/0x40\n tcf_register_action+0x9f/0x560\n do_one_initcall+0xf9/0x570\n do_init_module+0x190/0x650\n load_module+0x1fa5/0x23c0\n __do_sys_finit_module+0x10d/0x1b0\n do_syscall_64+0x58/0x80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n RIP: 0033:0x7f42518f778d\n Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48\n 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff\n ff 73 01 c3 48 8b 0d cb 56 2c 00 f7 d8 64 89 01 48\n RSP: 002b:00007fff96869688 EFLAGS: 00000246 ORIG_RAX: 0000000000000139\n RAX: ffffffffffffffda RBX: 00005568ef7f7c90 RCX: 00007f42518f778d\n RDX: 0000000000000000 RSI: 00005568ef41d796 RDI: 0000000000000003\n RBP: 00005568ef41d796 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000000\n R13: 00005568ef7f7d30 R14: 0000000000040000 R15: 0000000000000000\n \u003c/TASK\u003e\n\nThis change addresses the issue by skipping the gen pointer\nde-reference in the mentioned error-path.\n\nFound by code inspection and verified with explicit error injection\non a kasan-enabled kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52999",
"url": "https://www.suse.com/security/cve/CVE-2023-52999"
},
{
"category": "external",
"summary": "SUSE Bug 1240299 for CVE-2023-52999",
"url": "https://bugzilla.suse.com/1240299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52999"
},
{
"cve": "CVE-2023-53148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53148"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Fix igb_down hung on surprise removal\n\nIn a setup where a Thunderbolt hub connects to Ethernet and a display\nthrough USB Type-C, users may experience a hung task timeout when they\nremove the cable between the PC and the Thunderbolt hub.\nThis is because the igb_down function is called multiple times when\nthe Thunderbolt hub is unplugged. For example, the igb_io_error_detected\ntriggers the first call, and the igb_remove triggers the second call.\nThe second call to igb_down will block at napi_synchronize.\nHere\u0027s the call trace:\n __schedule+0x3b0/0xddb\n ? __mod_timer+0x164/0x5d3\n schedule+0x44/0xa8\n schedule_timeout+0xb2/0x2a4\n ? run_local_timers+0x4e/0x4e\n msleep+0x31/0x38\n igb_down+0x12c/0x22a [igb 6615058754948bfde0bf01429257eb59f13030d4]\n __igb_close+0x6f/0x9c [igb 6615058754948bfde0bf01429257eb59f13030d4]\n igb_close+0x23/0x2b [igb 6615058754948bfde0bf01429257eb59f13030d4]\n __dev_close_many+0x95/0xec\n dev_close_many+0x6e/0x103\n unregister_netdevice_many+0x105/0x5b1\n unregister_netdevice_queue+0xc2/0x10d\n unregister_netdev+0x1c/0x23\n igb_remove+0xa7/0x11c [igb 6615058754948bfde0bf01429257eb59f13030d4]\n pci_device_remove+0x3f/0x9c\n device_release_driver_internal+0xfe/0x1b4\n pci_stop_bus_device+0x5b/0x7f\n pci_stop_bus_device+0x30/0x7f\n pci_stop_bus_device+0x30/0x7f\n pci_stop_and_remove_bus_device+0x12/0x19\n pciehp_unconfigure_device+0x76/0xe9\n pciehp_disable_slot+0x6e/0x131\n pciehp_handle_presence_or_link_change+0x7a/0x3f7\n pciehp_ist+0xbe/0x194\n irq_thread_fn+0x22/0x4d\n ? irq_thread+0x1fd/0x1fd\n irq_thread+0x17b/0x1fd\n ? irq_forced_thread_fn+0x5f/0x5f\n kthread+0x142/0x153\n ? __irq_get_irqchip_state+0x46/0x46\n ? kthread_associate_blkcg+0x71/0x71\n ret_from_fork+0x1f/0x30\n\nIn this case, igb_io_error_detected detaches the network interface\nand requests a PCIE slot reset, however, the PCIE reset callback is\nnot being invoked and thus the Ethernet connection breaks down.\nAs the PCIE error in this case is a non-fatal one, requesting a\nslot reset can be avoided.\nThis patch fixes the task hung issue and preserves Ethernet\nconnection by ignoring non-fatal PCIE errors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53148",
"url": "https://www.suse.com/security/cve/CVE-2023-53148"
},
{
"category": "external",
"summary": "SUSE Bug 1249842 for CVE-2023-53148",
"url": "https://bugzilla.suse.com/1249842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-53148"
},
{
"cve": "CVE-2023-53178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix zswap writeback race condition\n\nThe zswap writeback mechanism can cause a race condition resulting in\nmemory corruption, where a swapped out page gets swapped in with data that\nwas written to a different page.\n\nThe race unfolds like this:\n1. a page with data A and swap offset X is stored in zswap\n2. page A is removed off the LRU by zpool driver for writeback in\n zswap-shrink work, data for A is mapped by zpool driver\n3. user space program faults and invalidates page entry A, offset X is\n considered free\n4. kswapd stores page B at offset X in zswap (zswap could also be\n full, if so, page B would then be IOed to X, then skip step 5.)\n5. entry A is replaced by B in tree-\u003erbroot, this doesn\u0027t affect the\n local reference held by zswap-shrink work\n6. zswap-shrink work writes back A at X, and frees zswap entry A\n7. swapin of slot X brings A in memory instead of B\n\nThe fix:\nOnce the swap page cache has been allocated (case ZSWAP_SWAPCACHE_NEW),\nzswap-shrink work just checks that the local zswap_entry reference is\nstill the same as the one in the tree. If it\u0027s not the same it means that\nit\u0027s either been invalidated or replaced, in both cases the writeback is\naborted because the local entry contains stale data.\n\nReproducer:\nI originally found this by running `stress` overnight to validate my work\non the zswap writeback mechanism, it manifested after hours on my test\nmachine. The key to make it happen is having zswap writebacks, so\nwhatever setup pumps /sys/kernel/debug/zswap/written_back_pages should do\nthe trick.\n\nIn order to reproduce this faster on a vm, I setup a system with ~100M of\navailable memory and a 500M swap file, then running `stress --vm 1\n--vm-bytes 300000000 --vm-stride 4000` makes it happen in matter of tens\nof minutes. One can speed things up even more by swinging\n/sys/module/zswap/parameters/max_pool_percent up and down between, say, 20\nand 1; this makes it reproduce in tens of seconds. It\u0027s crucial to set\n`--vm-stride` to something other than 4096 otherwise `stress` won\u0027t\nrealize that memory has been corrupted because all pages would have the\nsame data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53178",
"url": "https://www.suse.com/security/cve/CVE-2023-53178"
},
{
"category": "external",
"summary": "SUSE Bug 1249827 for CVE-2023-53178",
"url": "https://bugzilla.suse.com/1249827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-53178"
},
{
"cve": "CVE-2023-53226",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53226"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: Fix OOB and integer underflow when rx packets\n\nMake sure mwifiex_process_mgmt_packet,\nmwifiex_process_sta_rx_packet and mwifiex_process_uap_rx_packet,\nmwifiex_uap_queue_bridged_pkt and mwifiex_process_rx_packet\nnot out-of-bounds access the skb-\u003edata buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53226",
"url": "https://www.suse.com/security/cve/CVE-2023-53226"
},
{
"category": "external",
"summary": "SUSE Bug 1249658 for CVE-2023-53226",
"url": "https://bugzilla.suse.com/1249658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-53226"
},
{
"cve": "CVE-2023-53464",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53464"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi_tcp: Check that sock is valid before iscsi_set_param()\n\nThe validity of sock should be checked before assignment to avoid incorrect\nvalues. Commit 57569c37f0ad (\"scsi: iscsi: iscsi_tcp: Fix null-ptr-deref\nwhile calling getpeername()\") introduced this change which may lead to\ninconsistent values of tcp_sw_conn-\u003esendpage and conn-\u003edatadgst_en.\n\nFix the issue by moving the position of the assignment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53464",
"url": "https://www.suse.com/security/cve/CVE-2023-53464"
},
{
"category": "external",
"summary": "SUSE Bug 1250868 for CVE-2023-53464",
"url": "https://bugzilla.suse.com/1250868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-53464"
},
{
"cve": "CVE-2023-53685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53685"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntun: Fix memory leak for detached NAPI queue.\n\nsyzkaller reported [0] memory leaks of sk and skb related to the TUN\ndevice with no repro, but we can reproduce it easily with:\n\n struct ifreq ifr = {}\n int fd_tun, fd_tmp;\n char buf[4] = {};\n\n fd_tun = openat(AT_FDCWD, \"/dev/net/tun\", O_WRONLY, 0);\n ifr.ifr_flags = IFF_TUN | IFF_NAPI | IFF_MULTI_QUEUE;\n ioctl(fd_tun, TUNSETIFF, \u0026ifr);\n\n ifr.ifr_flags = IFF_DETACH_QUEUE;\n ioctl(fd_tun, TUNSETQUEUE, \u0026ifr);\n\n fd_tmp = socket(AF_PACKET, SOCK_PACKET, 0);\n ifr.ifr_flags = IFF_UP;\n ioctl(fd_tmp, SIOCSIFFLAGS, \u0026ifr);\n\n write(fd_tun, buf, sizeof(buf));\n close(fd_tun);\n\nIf we enable NAPI and multi-queue on a TUN device, we can put skb into\ntfile-\u003esk.sk_write_queue after the queue is detached. We should prevent\nit by checking tfile-\u003edetached before queuing skb.\n\nNote this must be done under tfile-\u003esk.sk_write_queue.lock because write()\nand ioctl(IFF_DETACH_QUEUE) can run concurrently. Otherwise, there would\nbe a small race window:\n\n write() ioctl(IFF_DETACH_QUEUE)\n `- tun_get_user `- __tun_detach\n |- if (tfile-\u003edetached) |- tun_disable_queue\n | `-\u003e false | `- tfile-\u003edetached = tun\n | `- tun_queue_purge\n |- spin_lock_bh(\u0026queue-\u003elock)\n `- __skb_queue_tail(queue, skb)\n\nAnother solution is to call tun_queue_purge() when closing and\nreattaching the detached queue, but it could paper over another\nproblems. Also, we do the same kind of test for IFF_NAPI_FRAGS.\n\n[0]:\nunreferenced object 0xffff88801edbc800 (size 2048):\n comm \"syz-executor.1\", pid 33269, jiffies 4295743834 (age 18.756s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............\n backtrace:\n [\u003c000000008c16ea3d\u003e] __do_kmalloc_node mm/slab_common.c:965 [inline]\n [\u003c000000008c16ea3d\u003e] __kmalloc+0x4a/0x130 mm/slab_common.c:979\n [\u003c000000003addde56\u003e] kmalloc include/linux/slab.h:563 [inline]\n [\u003c000000003addde56\u003e] sk_prot_alloc+0xef/0x1b0 net/core/sock.c:2035\n [\u003c000000003e20621f\u003e] sk_alloc+0x36/0x2f0 net/core/sock.c:2088\n [\u003c0000000028e43843\u003e] tun_chr_open+0x3d/0x190 drivers/net/tun.c:3438\n [\u003c000000001b0f1f28\u003e] misc_open+0x1a6/0x1f0 drivers/char/misc.c:165\n [\u003c000000004376f706\u003e] chrdev_open+0x111/0x300 fs/char_dev.c:414\n [\u003c00000000614d379f\u003e] do_dentry_open+0x2f9/0x750 fs/open.c:920\n [\u003c000000008eb24774\u003e] do_open fs/namei.c:3636 [inline]\n [\u003c000000008eb24774\u003e] path_openat+0x143f/0x1a30 fs/namei.c:3791\n [\u003c00000000955077b5\u003e] do_filp_open+0xce/0x1c0 fs/namei.c:3818\n [\u003c00000000b78973b0\u003e] do_sys_openat2+0xf0/0x260 fs/open.c:1356\n [\u003c00000000057be699\u003e] do_sys_open fs/open.c:1372 [inline]\n [\u003c00000000057be699\u003e] __do_sys_openat fs/open.c:1388 [inline]\n [\u003c00000000057be699\u003e] __se_sys_openat fs/open.c:1383 [inline]\n [\u003c00000000057be699\u003e] __x64_sys_openat+0x83/0xf0 fs/open.c:1383\n [\u003c00000000a7d2182d\u003e] do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n [\u003c00000000a7d2182d\u003e] do_syscall_64+0x3c/0x90 arch/x86/entry/common.c:80\n [\u003c000000004cc4e8c4\u003e] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nunreferenced object 0xffff88802f671700 (size 240):\n comm \"syz-executor.1\", pid 33269, jiffies 4295743854 (age 18.736s)\n hex dump (first 32 bytes):\n 68 c9 db 1e 80 88 ff ff 68 c9 db 1e 80 88 ff ff h.......h.......\n 00 c0 7b 2f 80 88 ff ff 00 c8 db 1e 80 88 ff ff ..{/............\n backtrace:\n [\u003c00000000e9d9fdb6\u003e] __alloc_skb+0x223/0x250 net/core/skbuff.c:644\n [\u003c000000002c3e4e0b\u003e] alloc_skb include/linux/skbuff.h:1288 [inline]\n [\u003c000000002c3e4e0b\u003e] alloc_skb_with_frags+0x6f/0x350 net/core/skbuff.c:6378\n [\u003c00000000825f98d7\u003e] sock_alloc_send_pskb+0x3ac/0x3e0 net/core/sock.c:2729\n [\u003c00000000e9eb3df3\u003e] tun_alloc_skb drivers/net/tun.c:1529 [inline]\n [\u003c\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53685",
"url": "https://www.suse.com/security/cve/CVE-2023-53685"
},
{
"category": "external",
"summary": "SUSE Bug 1251770 for CVE-2023-53685",
"url": "https://bugzilla.suse.com/1251770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "low"
}
],
"title": "CVE-2023-53685"
},
{
"cve": "CVE-2023-53747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53747"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF\n\nAfter a call to console_unlock() in vcs_write() the vc_data struct can be\nfreed by vc_port_destruct(). Because of that, the struct vc_data pointer\nmust be reloaded in the while loop in vcs_write() after console_lock() to\navoid a UAF when vcs_size() is called.\n\nSyzkaller reported a UAF in vcs_size().\n\nBUG: KASAN: slab-use-after-free in vcs_size (drivers/tty/vt/vc_screen.c:215)\nRead of size 4 at addr ffff8880beab89a8 by task repro_vcs_size/4119\n\nCall Trace:\n \u003cTASK\u003e\n__asan_report_load4_noabort (mm/kasan/report_generic.c:380)\nvcs_size (drivers/tty/vt/vc_screen.c:215)\nvcs_write (drivers/tty/vt/vc_screen.c:664)\nvfs_write (fs/read_write.c:582 fs/read_write.c:564)\n...\n \u003cTASK\u003e\n\nAllocated by task 1213:\nkmalloc_trace (mm/slab_common.c:1064)\nvc_allocate (./include/linux/slab.h:559 ./include/linux/slab.h:680\n drivers/tty/vt/vt.c:1078 drivers/tty/vt/vt.c:1058)\ncon_install (drivers/tty/vt/vt.c:3334)\ntty_init_dev (drivers/tty/tty_io.c:1303 drivers/tty/tty_io.c:1415\n drivers/tty/tty_io.c:1392)\ntty_open (drivers/tty/tty_io.c:2082 drivers/tty/tty_io.c:2128)\nchrdev_open (fs/char_dev.c:415)\ndo_dentry_open (fs/open.c:921)\nvfs_open (fs/open.c:1052)\n...\n\nFreed by task 4116:\nkfree (mm/slab_common.c:1016)\nvc_port_destruct (drivers/tty/vt/vt.c:1044)\ntty_port_destructor (drivers/tty/tty_port.c:296)\ntty_port_put (drivers/tty/tty_port.c:312)\nvt_disallocate_all (drivers/tty/vt/vt_ioctl.c:662 (discriminator 2))\nvt_ioctl (drivers/tty/vt/vt_ioctl.c:903)\ntty_ioctl (drivers/tty/tty_io.c:2778)\n...\n\nThe buggy address belongs to the object at ffff8880beab8800\n which belongs to the cache kmalloc-1k of size 1024\nThe buggy address is located 424 bytes inside of\n freed 1024-byte region [ffff8880beab8800, ffff8880beab8c00)\n\nThe buggy address belongs to the physical page:\npage:00000000afc77580 refcount:1 mapcount:0 mapping:0000000000000000\n index:0x0 pfn:0xbeab8\nhead:00000000afc77580 order:3 entire_mapcount:0 nr_pages_mapped:0\n pincount:0\nflags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff)\npage_type: 0xffffffff()\nraw: 000fffffc0010200 ffff888100042dc0 ffffea000426de00 dead000000000002\nraw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff8880beab8880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff8880beab8900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n\u003effff8880beab8980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ^\n ffff8880beab8a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff8880beab8a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n==================================================================\nDisabling lock debugging due to kernel taint",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53747",
"url": "https://www.suse.com/security/cve/CVE-2023-53747"
},
{
"category": "external",
"summary": "SUSE Bug 1254572 for CVE-2023-53747",
"url": "https://bugzilla.suse.com/1254572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-53747"
},
{
"cve": "CVE-2023-53751",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53751"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix potential use-after-free bugs in TCP_Server_Info::hostname\n\nTCP_Server_Info::hostname may be updated once or many times during\nreconnect, so protect its access outside reconnect path as well and\nthen prevent any potential use-after-free bugs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53751",
"url": "https://www.suse.com/security/cve/CVE-2023-53751"
},
{
"category": "external",
"summary": "SUSE Bug 1254986 for CVE-2023-53751",
"url": "https://bugzilla.suse.com/1254986"
},
{
"category": "external",
"summary": "SUSE Bug 1254988 for CVE-2023-53751",
"url": "https://bugzilla.suse.com/1254988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-53751"
},
{
"cve": "CVE-2023-53825",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53825"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg().\n\nsyzkaller found a memory leak in kcm_sendmsg(), and commit c821a88bd720\n(\"kcm: Fix memory leak in error path of kcm_sendmsg()\") suppressed it by\nupdating kcm_tx_msg(head)-\u003elast_skb if partial data is copied so that the\nfollowing sendmsg() will resume from the skb.\n\nHowever, we cannot know how many bytes were copied when we get the error.\nThus, we could mess up the MSG_MORE queue.\n\nWhen kcm_sendmsg() fails for SOCK_DGRAM, we should purge the queue as we\ndo so for UDP by udp_flush_pending_frames().\n\nEven without this change, when the error occurred, the following sendmsg()\nresumed from a wrong skb and the queue was messed up. However, we have\nyet to get such a report, and only syzkaller stumbled on it. So, this\ncan be changed safely.\n\nNote this does not change SOCK_SEQPACKET behaviour.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53825",
"url": "https://www.suse.com/security/cve/CVE-2023-53825"
},
{
"category": "external",
"summary": "SUSE Bug 1254707 for CVE-2023-53825",
"url": "https://bugzilla.suse.com/1254707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-53825"
},
{
"cve": "CVE-2023-53853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53853"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: annotate accesses to nlk-\u003ecb_running\n\nBoth netlink_recvmsg() and netlink_native_seq_show() read\nnlk-\u003ecb_running locklessly. Use READ_ONCE() there.\n\nAdd corresponding WRITE_ONCE() to netlink_dump() and\n__netlink_dump_start()\n\nsyzbot reported:\nBUG: KCSAN: data-race in __netlink_dump_start / netlink_recvmsg\n\nwrite to 0xffff88813ea4db59 of 1 bytes by task 28219 on cpu 0:\n__netlink_dump_start+0x3af/0x4d0 net/netlink/af_netlink.c:2399\nnetlink_dump_start include/linux/netlink.h:308 [inline]\nrtnetlink_rcv_msg+0x70f/0x8c0 net/core/rtnetlink.c:6130\nnetlink_rcv_skb+0x126/0x220 net/netlink/af_netlink.c:2577\nrtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:6192\nnetlink_unicast_kernel net/netlink/af_netlink.c:1339 [inline]\nnetlink_unicast+0x56f/0x640 net/netlink/af_netlink.c:1365\nnetlink_sendmsg+0x665/0x770 net/netlink/af_netlink.c:1942\nsock_sendmsg_nosec net/socket.c:724 [inline]\nsock_sendmsg net/socket.c:747 [inline]\nsock_write_iter+0x1aa/0x230 net/socket.c:1138\ncall_write_iter include/linux/fs.h:1851 [inline]\nnew_sync_write fs/read_write.c:491 [inline]\nvfs_write+0x463/0x760 fs/read_write.c:584\nksys_write+0xeb/0x1a0 fs/read_write.c:637\n__do_sys_write fs/read_write.c:649 [inline]\n__se_sys_write fs/read_write.c:646 [inline]\n__x64_sys_write+0x42/0x50 fs/read_write.c:646\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nread to 0xffff88813ea4db59 of 1 bytes by task 28222 on cpu 1:\nnetlink_recvmsg+0x3b4/0x730 net/netlink/af_netlink.c:2022\nsock_recvmsg_nosec+0x4c/0x80 net/socket.c:1017\n____sys_recvmsg+0x2db/0x310 net/socket.c:2718\n___sys_recvmsg net/socket.c:2762 [inline]\ndo_recvmmsg+0x2e5/0x710 net/socket.c:2856\n__sys_recvmmsg net/socket.c:2935 [inline]\n__do_sys_recvmmsg net/socket.c:2958 [inline]\n__se_sys_recvmmsg net/socket.c:2951 [inline]\n__x64_sys_recvmmsg+0xe2/0x160 net/socket.c:2951\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nvalue changed: 0x00 -\u003e 0x01",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53853",
"url": "https://www.suse.com/security/cve/CVE-2023-53853"
},
{
"category": "external",
"summary": "SUSE Bug 1254673 for CVE-2023-53853",
"url": "https://bugzilla.suse.com/1254673"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-53853"
},
{
"cve": "CVE-2023-53863",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53863"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: do not hard code device address lenth in fdb dumps\n\nsyzbot reports that some netdev devices do not have a six bytes\naddress [1]\n\nReplace ETH_ALEN by dev-\u003eaddr_len.\n\n[1] (Case of a device where dev-\u003eaddr_len = 4)\n\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\nBUG: KMSAN: kernel-infoleak in copyout+0xb8/0x100 lib/iov_iter.c:169\ninstrument_copy_to_user include/linux/instrumented.h:114 [inline]\ncopyout+0xb8/0x100 lib/iov_iter.c:169\n_copy_to_iter+0x6d8/0x1d00 lib/iov_iter.c:536\ncopy_to_iter include/linux/uio.h:206 [inline]\nsimple_copy_to_iter+0x68/0xa0 net/core/datagram.c:513\n__skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:419\nskb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:527\nskb_copy_datagram_msg include/linux/skbuff.h:3960 [inline]\nnetlink_recvmsg+0x4ae/0x15a0 net/netlink/af_netlink.c:1970\nsock_recvmsg_nosec net/socket.c:1019 [inline]\nsock_recvmsg net/socket.c:1040 [inline]\n____sys_recvmsg+0x283/0x7f0 net/socket.c:2722\n___sys_recvmsg+0x223/0x840 net/socket.c:2764\ndo_recvmmsg+0x4f9/0xfd0 net/socket.c:2858\n__sys_recvmmsg net/socket.c:2937 [inline]\n__do_sys_recvmmsg net/socket.c:2960 [inline]\n__se_sys_recvmmsg net/socket.c:2953 [inline]\n__x64_sys_recvmmsg+0x397/0x490 net/socket.c:2953\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUninit was stored to memory at:\n__nla_put lib/nlattr.c:1009 [inline]\nnla_put+0x1c6/0x230 lib/nlattr.c:1067\nnlmsg_populate_fdb_fill+0x2b8/0x600 net/core/rtnetlink.c:4071\nnlmsg_populate_fdb net/core/rtnetlink.c:4418 [inline]\nndo_dflt_fdb_dump+0x616/0x840 net/core/rtnetlink.c:4456\nrtnl_fdb_dump+0x14ff/0x1fc0 net/core/rtnetlink.c:4629\nnetlink_dump+0x9d1/0x1310 net/netlink/af_netlink.c:2268\nnetlink_recvmsg+0xc5c/0x15a0 net/netlink/af_netlink.c:1995\nsock_recvmsg_nosec+0x7a/0x120 net/socket.c:1019\n____sys_recvmsg+0x664/0x7f0 net/socket.c:2720\n___sys_recvmsg+0x223/0x840 net/socket.c:2764\ndo_recvmmsg+0x4f9/0xfd0 net/socket.c:2858\n__sys_recvmmsg net/socket.c:2937 [inline]\n__do_sys_recvmmsg net/socket.c:2960 [inline]\n__se_sys_recvmmsg net/socket.c:2953 [inline]\n__x64_sys_recvmmsg+0x397/0x490 net/socket.c:2953\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUninit was created at:\nslab_post_alloc_hook+0x12d/0xb60 mm/slab.h:716\nslab_alloc_node mm/slub.c:3451 [inline]\n__kmem_cache_alloc_node+0x4ff/0x8b0 mm/slub.c:3490\nkmalloc_trace+0x51/0x200 mm/slab_common.c:1057\nkmalloc include/linux/slab.h:559 [inline]\n__hw_addr_create net/core/dev_addr_lists.c:60 [inline]\n__hw_addr_add_ex+0x2e5/0x9e0 net/core/dev_addr_lists.c:118\n__dev_mc_add net/core/dev_addr_lists.c:867 [inline]\ndev_mc_add+0x9a/0x130 net/core/dev_addr_lists.c:885\nigmp6_group_added+0x267/0xbc0 net/ipv6/mcast.c:680\nipv6_mc_up+0x296/0x3b0 net/ipv6/mcast.c:2754\nipv6_mc_remap+0x1e/0x30 net/ipv6/mcast.c:2708\naddrconf_type_change net/ipv6/addrconf.c:3731 [inline]\naddrconf_notify+0x4d3/0x1d90 net/ipv6/addrconf.c:3699\nnotifier_call_chain kernel/notifier.c:93 [inline]\nraw_notifier_call_chain+0xe4/0x430 kernel/notifier.c:461\ncall_netdevice_notifiers_info net/core/dev.c:1935 [inline]\ncall_netdevice_notifiers_extack net/core/dev.c:1973 [inline]\ncall_netdevice_notifiers+0x1ee/0x2d0 net/core/dev.c:1987\nbond_enslave+0xccd/0x53f0 drivers/net/bonding/bond_main.c:1906\ndo_set_master net/core/rtnetlink.c:2626 [inline]\nrtnl_newlink_create net/core/rtnetlink.c:3460 [inline]\n__rtnl_newlink net/core/rtnetlink.c:3660 [inline]\nrtnl_newlink+0x378c/0x40e0 net/core/rtnetlink.c:3673\nrtnetlink_rcv_msg+0x16a6/0x1840 net/core/rtnetlink.c:6395\nnetlink_rcv_skb+0x371/0x650 net/netlink/af_netlink.c:2546\nrtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6413\nnetlink_unicast_kernel net/netlink/af_netlink.c:1339 [inline]\nnetlink_unicast+0xf28/0x1230 net/netlink/af_\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53863",
"url": "https://www.suse.com/security/cve/CVE-2023-53863"
},
{
"category": "external",
"summary": "SUSE Bug 1254657 for CVE-2023-53863",
"url": "https://bugzilla.suse.com/1254657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-53863"
},
{
"cve": "CVE-2023-53992",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53992"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: ocb: don\u0027t leave if not joined\n\nIf there\u0027s no OCB state, don\u0027t ask the driver/mac80211 to\nleave, since that\u0027s just confusing. Since set/clear the\nchandef state, that\u0027s a simple check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53992",
"url": "https://www.suse.com/security/cve/CVE-2023-53992"
},
{
"category": "external",
"summary": "SUSE Bug 1256058 for CVE-2023-53992",
"url": "https://bugzilla.suse.com/1256058"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-53992"
},
{
"cve": "CVE-2023-54012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54012"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix stack overflow when LRO is disabled for virtual interfaces\n\nWhen the virtual interface\u0027s feature is updated, it synchronizes the\nupdated feature for its own lower interface.\nThis propagation logic should be worked as the iteration, not recursively.\nBut it works recursively due to the netdev notification unexpectedly.\nThis problem occurs when it disables LRO only for the team and bonding\ninterface type.\n\n team0\n |\n +------+------+-----+-----+\n | | | | |\nteam1 team2 team3 ... team200\n\nIf team0\u0027s LRO feature is updated, it generates the NETDEV_FEAT_CHANGE\nevent to its own lower interfaces(team1 ~ team200).\nIt is worked by netdev_sync_lower_features().\nSo, the NETDEV_FEAT_CHANGE notification logic of each lower interface\nwork iteratively.\nBut generated NETDEV_FEAT_CHANGE event is also sent to the upper\ninterface too.\nupper interface(team0) generates the NETDEV_FEAT_CHANGE event for its own\nlower interfaces again.\nlower and upper interfaces receive this event and generate this\nevent again and again.\nSo, the stack overflow occurs.\n\nBut it is not the infinite loop issue.\nBecause the netdev_sync_lower_features() updates features before\ngenerating the NETDEV_FEAT_CHANGE event.\nAlready synchronized lower interfaces skip notification logic.\nSo, it is just the problem that iteration logic is changed to the\nrecursive unexpectedly due to the notification mechanism.\n\nReproducer:\n\nip link add team0 type team\nethtool -K team0 lro on\nfor i in {1..200}\ndo\n ip link add team$i master team0 type team\n ethtool -K team$i lro on\ndone\n\nethtool -K team0 lro off\n\nIn order to fix it, the notifier_ctx member of bonding/team is introduced.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54012",
"url": "https://www.suse.com/security/cve/CVE-2023-54012"
},
{
"category": "external",
"summary": "SUSE Bug 1255571 for CVE-2023-54012",
"url": "https://bugzilla.suse.com/1255571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54012"
},
{
"cve": "CVE-2023-54047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/rockchip: dw_hdmi: cleanup drm encoder during unbind\n\nThis fixes a use-after-free crash during rmmod.\n\nThe DRM encoder is embedded inside the larger rockchip_hdmi,\nwhich is allocated with the component. The component memory\ngets freed before the main drm device is destroyed. Fix it\nby running encoder cleanup before tearing down its container.\n\n[moved encoder cleanup above clk_disable, similar to bind-error-path]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54047",
"url": "https://www.suse.com/security/cve/CVE-2023-54047"
},
{
"category": "external",
"summary": "SUSE Bug 1256398 for CVE-2023-54047",
"url": "https://bugzilla.suse.com/1256398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54047"
},
{
"cve": "CVE-2023-54048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Prevent handling any completions after qp destroy\n\nHW may generate completions that indicates QP is destroyed.\nDriver should not be scheduling any more completion handlers\nfor this QP, after the QP is destroyed. Since CQs are active\nduring the QP destroy, driver may still schedule completion\nhandlers. This can cause a race where the destroy_cq and poll_cq\nrunning simultaneously.\n\nSnippet of kernel panic while doing bnxt_re driver load unload in loop.\nThis indicates a poll after the CQ is freed. \n\n[77786.481636] Call Trace:\n[77786.481640] \u003cTASK\u003e\n[77786.481644] bnxt_re_poll_cq+0x14a/0x620 [bnxt_re]\n[77786.481658] ? kvm_clock_read+0x14/0x30\n[77786.481693] __ib_process_cq+0x57/0x190 [ib_core]\n[77786.481728] ib_cq_poll_work+0x26/0x80 [ib_core]\n[77786.481761] process_one_work+0x1e5/0x3f0\n[77786.481768] worker_thread+0x50/0x3a0\n[77786.481785] ? __pfx_worker_thread+0x10/0x10\n[77786.481790] kthread+0xe2/0x110\n[77786.481794] ? __pfx_kthread+0x10/0x10\n[77786.481797] ret_from_fork+0x2c/0x50\n\nTo avoid this, complete all completion handlers before returning the\ndestroy QP. If free_cq is called soon after destroy_qp, IB stack\nwill cancel the CQ work before invoking the destroy_cq verb and\nthis will prevent any race mentioned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54048",
"url": "https://www.suse.com/security/cve/CVE-2023-54048"
},
{
"category": "external",
"summary": "SUSE Bug 1256395 for CVE-2023-54048",
"url": "https://bugzilla.suse.com/1256395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54048"
},
{
"cve": "CVE-2023-54067",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54067"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race when deleting free space root from the dirty cow roots list\n\nWhen deleting the free space tree we are deleting the free space root\nfrom the list fs_info-\u003edirty_cowonly_roots without taking the lock that\nprotects it, which is struct btrfs_fs_info::trans_lock.\nThis unsynchronized list manipulation may cause chaos if there\u0027s another\nconcurrent manipulation of this list, such as when adding a root to it\nwith ctree.c:add_root_to_dirty_list().\n\nThis can result in all sorts of weird failures caused by a race, such as\nthe following crash:\n\n [337571.278245] general protection fault, probably for non-canonical address 0xdead000000000108: 0000 [#1] PREEMPT SMP PTI\n [337571.278933] CPU: 1 PID: 115447 Comm: btrfs Tainted: G W 6.4.0-rc6-btrfs-next-134+ #1\n [337571.279153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n [337571.279572] RIP: 0010:commit_cowonly_roots+0x11f/0x250 [btrfs]\n [337571.279928] Code: 85 38 06 00 (...)\n [337571.280363] RSP: 0018:ffff9f63446efba0 EFLAGS: 00010206\n [337571.280582] RAX: ffff942d98ec2638 RBX: ffff9430b82b4c30 RCX: 0000000449e1c000\n [337571.280798] RDX: dead000000000100 RSI: ffff9430021e4900 RDI: 0000000000036070\n [337571.281015] RBP: ffff942d98ec2000 R08: ffff942d98ec2000 R09: 000000000000015b\n [337571.281254] R10: 0000000000000009 R11: 0000000000000001 R12: ffff942fe8fbf600\n [337571.281476] R13: ffff942dabe23040 R14: ffff942dabe20800 R15: ffff942d92cf3b48\n [337571.281723] FS: 00007f478adb7340(0000) GS:ffff94349fa40000(0000) knlGS:0000000000000000\n [337571.281950] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [337571.282184] CR2: 00007f478ab9a3d5 CR3: 000000001e02c001 CR4: 0000000000370ee0\n [337571.282416] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n [337571.282647] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n [337571.282874] Call Trace:\n [337571.283101] \u003cTASK\u003e\n [337571.283327] ? __die_body+0x1b/0x60\n [337571.283570] ? die_addr+0x39/0x60\n [337571.283796] ? exc_general_protection+0x22e/0x430\n [337571.284022] ? asm_exc_general_protection+0x22/0x30\n [337571.284251] ? commit_cowonly_roots+0x11f/0x250 [btrfs]\n [337571.284531] btrfs_commit_transaction+0x42e/0xf90 [btrfs]\n [337571.284803] ? _raw_spin_unlock+0x15/0x30\n [337571.285031] ? release_extent_buffer+0x103/0x130 [btrfs]\n [337571.285305] reset_balance_state+0x152/0x1b0 [btrfs]\n [337571.285578] btrfs_balance+0xa50/0x11e0 [btrfs]\n [337571.285864] ? __kmem_cache_alloc_node+0x14a/0x410\n [337571.286086] btrfs_ioctl+0x249a/0x3320 [btrfs]\n [337571.286358] ? mod_objcg_state+0xd2/0x360\n [337571.286577] ? refill_obj_stock+0xb0/0x160\n [337571.286798] ? seq_release+0x25/0x30\n [337571.287016] ? __rseq_handle_notify_resume+0x3ba/0x4b0\n [337571.287235] ? percpu_counter_add_batch+0x2e/0xa0\n [337571.287455] ? __x64_sys_ioctl+0x88/0xc0\n [337571.287675] __x64_sys_ioctl+0x88/0xc0\n [337571.287901] do_syscall_64+0x38/0x90\n [337571.288126] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n [337571.288352] RIP: 0033:0x7f478aaffe9b\n\nSo fix this by locking struct btrfs_fs_info::trans_lock before deleting\nthe free space root from that list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54067",
"url": "https://www.suse.com/security/cve/CVE-2023-54067"
},
{
"category": "external",
"summary": "SUSE Bug 1256369 for CVE-2023-54067",
"url": "https://bugzilla.suse.com/1256369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54067"
},
{
"cve": "CVE-2023-54111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups\n\nof_find_node_by_phandle() returns a node pointer with refcount incremented,\nWe should use of_node_put() on it when not needed anymore.\nAdd missing of_node_put() to avoid refcount leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54111",
"url": "https://www.suse.com/security/cve/CVE-2023-54111"
},
{
"category": "external",
"summary": "SUSE Bug 1256149 for CVE-2023-54111",
"url": "https://bugzilla.suse.com/1256149"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54111"
},
{
"cve": "CVE-2023-54112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54112"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkcm: Fix memory leak in error path of kcm_sendmsg()\n\nsyzbot reported a memory leak like below:\n\nBUG: memory leak\nunreferenced object 0xffff88810b088c00 (size 240):\n comm \"syz-executor186\", pid 5012, jiffies 4294943306 (age 13.680s)\n hex dump (first 32 bytes):\n 00 89 08 0b 81 88 ff ff 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003cffffffff83e5d5ff\u003e] __alloc_skb+0x1ef/0x230 net/core/skbuff.c:634\n [\u003cffffffff84606e59\u003e] alloc_skb include/linux/skbuff.h:1289 [inline]\n [\u003cffffffff84606e59\u003e] kcm_sendmsg+0x269/0x1050 net/kcm/kcmsock.c:815\n [\u003cffffffff83e479c6\u003e] sock_sendmsg_nosec net/socket.c:725 [inline]\n [\u003cffffffff83e479c6\u003e] sock_sendmsg+0x56/0xb0 net/socket.c:748\n [\u003cffffffff83e47f55\u003e] ____sys_sendmsg+0x365/0x470 net/socket.c:2494\n [\u003cffffffff83e4c389\u003e] ___sys_sendmsg+0xc9/0x130 net/socket.c:2548\n [\u003cffffffff83e4c536\u003e] __sys_sendmsg+0xa6/0x120 net/socket.c:2577\n [\u003cffffffff84ad7bb8\u003e] do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n [\u003cffffffff84ad7bb8\u003e] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80\n [\u003cffffffff84c0008b\u003e] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nIn kcm_sendmsg(), kcm_tx_msg(head)-\u003elast_skb is used as a cursor to append\nnewly allocated skbs to \u0027head\u0027. If some bytes are copied, an error occurred,\nand jumped to out_error label, \u0027last_skb\u0027 is left unmodified. A later\nkcm_sendmsg() will use an obsoleted \u0027last_skb\u0027 reference, corrupting the\n\u0027head\u0027 frag_list and causing the leak.\n\nThis patch fixes this issue by properly updating the last allocated skb in\n\u0027last_skb\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54112",
"url": "https://www.suse.com/security/cve/CVE-2023-54112"
},
{
"category": "external",
"summary": "SUSE Bug 1256354 for CVE-2023-54112",
"url": "https://bugzilla.suse.com/1256354"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54112"
},
{
"cve": "CVE-2023-54118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: sc16is7xx: setup GPIO controller later in probe\n\nThe GPIO controller component of the sc16is7xx driver is setup too\nearly, which can result in a race condition where another device tries\nto utilise the GPIO lines before the sc16is7xx device has finished\ninitialising.\n\nThis issue manifests itself as an Oops when the GPIO lines are configured:\n\n Unable to handle kernel read from unreadable memory at virtual address\n ...\n pc : sc16is7xx_gpio_direction_output+0x68/0x108 [sc16is7xx]\n lr : sc16is7xx_gpio_direction_output+0x4c/0x108 [sc16is7xx]\n ...\n Call trace:\n sc16is7xx_gpio_direction_output+0x68/0x108 [sc16is7xx]\n gpiod_direction_output_raw_commit+0x64/0x318\n gpiod_direction_output+0xb0/0x170\n create_gpio_led+0xec/0x198\n gpio_led_probe+0x16c/0x4f0\n platform_drv_probe+0x5c/0xb0\n really_probe+0xe8/0x448\n driver_probe_device+0xe8/0x138\n __device_attach_driver+0x94/0x118\n bus_for_each_drv+0x8c/0xe0\n __device_attach+0x100/0x1b8\n device_initial_probe+0x28/0x38\n bus_probe_device+0xa4/0xb0\n deferred_probe_work_func+0x90/0xe0\n process_one_work+0x1c4/0x480\n worker_thread+0x54/0x430\n kthread+0x138/0x150\n ret_from_fork+0x10/0x1c\n\nThis patch moves the setup of the GPIO controller functions to later in the\nprobe function, ensuring the sc16is7xx device has already finished\ninitialising by the time other devices try to make use of the GPIO lines.\nThe error handling has also been reordered to reflect the new\ninitialisation order.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54118",
"url": "https://www.suse.com/security/cve/CVE-2023-54118"
},
{
"category": "external",
"summary": "SUSE Bug 1256131 for CVE-2023-54118",
"url": "https://bugzilla.suse.com/1256131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54118"
},
{
"cve": "CVE-2023-54121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix incorrect splitting in btrfs_drop_extent_map_range\n\nIn production we were seeing a variety of WARN_ON()\u0027s in the extent_map\ncode, specifically in btrfs_drop_extent_map_range() when we have to call\nadd_extent_mapping() for our second split.\n\nConsider the following extent map layout\n\n\tPINNED\n\t[0 16K) [32K, 48K)\n\nand then we call btrfs_drop_extent_map_range for [0, 36K), with\nskip_pinned == true. The initial loop will have\n\n\tstart = 0\n\tend = 36K\n\tlen = 36K\n\nwe will find the [0, 16k) extent, but since we are pinned we will skip\nit, which has this code\n\n\tstart = em_end;\n\tif (end != (u64)-1)\n\t\tlen = start + len - em_end;\n\nem_end here is 16K, so now the values are\n\n\tstart = 16K\n\tlen = 16K + 36K - 16K = 36K\n\nlen should instead be 20K. This is a problem when we find the next\nextent at [32K, 48K), we need to split this extent to leave [36K, 48k),\nhowever the code for the split looks like this\n\n\tsplit-\u003estart = start + len;\n\tsplit-\u003elen = em_end - (start + len);\n\nIn this case we have\n\n\tem_end = 48K\n\tsplit-\u003estart = 16K + 36K // this should be 16K + 20K\n\tsplit-\u003elen = 48K - (16K + 36K) // this overflows as 16K + 36K is 52K\n\nand now we have an invalid extent_map in the tree that potentially\noverlaps other entries in the extent map. Even in the non-overlapping\ncase we will have split-\u003estart set improperly, which will cause problems\nwith any block related calculations.\n\nWe don\u0027t actually need len in this loop, we can simply use end as our\nend point, and only adjust start up when we find a pinned extent we need\nto skip.\n\nAdjust the logic to do this, which keeps us from inserting an invalid\nextent map.\n\nWe only skip_pinned in the relocation case, so this is relatively rare,\nexcept in the case where you are running relocation a lot, which can\nhappen with auto relocation on.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54121",
"url": "https://www.suse.com/security/cve/CVE-2023-54121"
},
{
"category": "external",
"summary": "SUSE Bug 1256267 for CVE-2023-54121",
"url": "https://bugzilla.suse.com/1256267"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54121"
},
{
"cve": "CVE-2023-54134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nautofs: fix memory leak of waitqueues in autofs_catatonic_mode\n\nSyzkaller reports a memory leak:\n\nBUG: memory leak\nunreferenced object 0xffff88810b279e00 (size 96):\n comm \"syz-executor399\", pid 3631, jiffies 4294964921 (age 23.870s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 08 9e 27 0b 81 88 ff ff ..........\u0027.....\n 08 9e 27 0b 81 88 ff ff 00 00 00 00 00 00 00 00 ..\u0027.............\n backtrace:\n [\u003cffffffff814cfc90\u003e] kmalloc_trace+0x20/0x90 mm/slab_common.c:1046\n [\u003cffffffff81bb75ca\u003e] kmalloc include/linux/slab.h:576 [inline]\n [\u003cffffffff81bb75ca\u003e] autofs_wait+0x3fa/0x9a0 fs/autofs/waitq.c:378\n [\u003cffffffff81bb88a7\u003e] autofs_do_expire_multi+0xa7/0x3e0 fs/autofs/expire.c:593\n [\u003cffffffff81bb8c33\u003e] autofs_expire_multi+0x53/0x80 fs/autofs/expire.c:619\n [\u003cffffffff81bb6972\u003e] autofs_root_ioctl_unlocked+0x322/0x3b0 fs/autofs/root.c:897\n [\u003cffffffff81bb6a95\u003e] autofs_root_ioctl+0x25/0x30 fs/autofs/root.c:910\n [\u003cffffffff81602a9c\u003e] vfs_ioctl fs/ioctl.c:51 [inline]\n [\u003cffffffff81602a9c\u003e] __do_sys_ioctl fs/ioctl.c:870 [inline]\n [\u003cffffffff81602a9c\u003e] __se_sys_ioctl fs/ioctl.c:856 [inline]\n [\u003cffffffff81602a9c\u003e] __x64_sys_ioctl+0xfc/0x140 fs/ioctl.c:856\n [\u003cffffffff84608225\u003e] do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n [\u003cffffffff84608225\u003e] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n [\u003cffffffff84800087\u003e] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nautofs_wait_queue structs should be freed if their wait_ctr becomes zero.\nOtherwise they will be lost.\n\nIn this case an AUTOFS_IOC_EXPIRE_MULTI ioctl is done, then a new\nwaitqueue struct is allocated in autofs_wait(), its initial wait_ctr\nequals 2. After that wait_event_killable() is interrupted (it returns\n-ERESTARTSYS), so that \u0027wq-\u003ename.name == NULL\u0027 condition may be not\nsatisfied. Actually, this condition can be satisfied when\nautofs_wait_release() or autofs_catatonic_mode() is called and, what is\nalso important, wait_ctr is decremented in those places. Upon the exit of\nautofs_wait(), wait_ctr is decremented to 1. Then the unmounting process\nbegins: kill_sb calls autofs_catatonic_mode(), which should have freed the\nwaitqueues, but it only decrements its usage counter to zero which is not\na correct behaviour.\n\nedit:imk\nThis description is of course not correct. The umount performed as a result\nof an expire is a umount of a mount that has been automounted, it\u0027s not the\nautofs mount itself. They happen independently, usually after everything\nmounted within the autofs file system has been expired away. If everything\nhasn\u0027t been expired away the automount daemon can still exit leaving mounts\nin place. But expires done in both cases will result in a notification that\ncalls autofs_wait_release() with a result status. The problem case is the\nsummary execution of of the automount daemon. In this case any waiting\nprocesses won\u0027t be woken up until either they are terminated or the mount\nis umounted.\nend edit: imk\n\nSo in catatonic mode we should free waitqueues which counter becomes zero.\n\nedit: imk\nInitially I was concerned that the calling of autofs_wait_release() and\nautofs_catatonic_mode() was not mutually exclusive but that can\u0027t be the\ncase (obviously) because the queue entry (or entries) is removed from the\nlist when either of these two functions are called. Consequently the wait\nentry will be freed by only one of these functions or by the woken process\nin autofs_wait() depending on the order of the calls.\nend edit: imk",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54134",
"url": "https://www.suse.com/security/cve/CVE-2023-54134"
},
{
"category": "external",
"summary": "SUSE Bug 1256106 for CVE-2023-54134",
"url": "https://bugzilla.suse.com/1256106"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54134"
},
{
"cve": "CVE-2023-54198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: fix out-of-bounds access in tty_driver_lookup_tty()\n\nWhen specifying an invalid console= device like console=tty3270,\ntty_driver_lookup_tty() returns the tty struct without checking\nwhether index is a valid number.\n\nTo reproduce:\n\nqemu-system-x86_64 -enable-kvm -nographic -serial mon:stdio \\\n-kernel ../linux-build-x86/arch/x86/boot/bzImage \\\n-append \"console=ttyS0 console=tty3270\"\n\nThis crashes with:\n\n[ 0.770599] BUG: kernel NULL pointer dereference, address: 00000000000000ef\n[ 0.771265] #PF: supervisor read access in kernel mode\n[ 0.771773] #PF: error_code(0x0000) - not-present page\n[ 0.772609] Oops: 0000 [#1] PREEMPT SMP PTI\n[ 0.774878] RIP: 0010:tty_open+0x268/0x6f0\n[ 0.784013] chrdev_open+0xbd/0x230\n[ 0.784444] ? cdev_device_add+0x80/0x80\n[ 0.784920] do_dentry_open+0x1e0/0x410\n[ 0.785389] path_openat+0xca9/0x1050\n[ 0.785813] do_filp_open+0xaa/0x150\n[ 0.786240] file_open_name+0x133/0x1b0\n[ 0.786746] filp_open+0x27/0x50\n[ 0.787244] console_on_rootfs+0x14/0x4d\n[ 0.787800] kernel_init_freeable+0x1e4/0x20d\n[ 0.788383] ? rest_init+0xc0/0xc0\n[ 0.788881] kernel_init+0x11/0x120\n[ 0.789356] ret_from_fork+0x22/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54198",
"url": "https://www.suse.com/security/cve/CVE-2023-54198"
},
{
"category": "external",
"summary": "SUSE Bug 1255970 for CVE-2023-54198",
"url": "https://bugzilla.suse.com/1255970"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54198"
},
{
"cve": "CVE-2023-54202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: fix race condition UAF in i915_perf_add_config_ioctl\n\nUserspace can guess the id value and try to race oa_config object creation\nwith config remove, resulting in a use-after-free if we dereference the\nobject after unlocking the metrics_lock. For that reason, unlocking the\nmetrics_lock must be done after we are done dereferencing the object.\n\n[tursulin: Manually added stable tag.]\n(cherry picked from commit 49f6f6483b652108bcb73accd0204a464b922395)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54202",
"url": "https://www.suse.com/security/cve/CVE-2023-54202"
},
{
"category": "external",
"summary": "SUSE Bug 1255880 for CVE-2023-54202",
"url": "https://bugzilla.suse.com/1255880"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54202"
},
{
"cve": "CVE-2023-54207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: uclogic: Correct devm device reference for hidinput input_dev name\n\nReference the HID device rather than the input device for the devm\nallocation of the input_dev name. Referencing the input_dev would lead to a\nuse-after-free when the input_dev was unregistered and subsequently fires a\nuevent that depends on the name. At the point of firing the uevent, the\nname would be freed by devres management.\n\nUse devm_kasprintf to simplify the logic for allocating memory and\nformatting the input_dev name string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54207",
"url": "https://www.suse.com/security/cve/CVE-2023-54207"
},
{
"category": "external",
"summary": "SUSE Bug 1255961 for CVE-2023-54207",
"url": "https://bugzilla.suse.com/1255961"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54207"
},
{
"cve": "CVE-2023-54218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54218"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: Fix load-tearing on sk-\u003esk_stamp in sock_recv_cmsgs().\n\nKCSAN found a data race in sock_recv_cmsgs() where the read access\nto sk-\u003esk_stamp needs READ_ONCE().\n\nBUG: KCSAN: data-race in packet_recvmsg / packet_recvmsg\n\nwrite (marked) to 0xffff88803c81f258 of 8 bytes by task 19171 on cpu 0:\n sock_write_timestamp include/net/sock.h:2670 [inline]\n sock_recv_cmsgs include/net/sock.h:2722 [inline]\n packet_recvmsg+0xb97/0xd00 net/packet/af_packet.c:3489\n sock_recvmsg_nosec net/socket.c:1019 [inline]\n sock_recvmsg+0x11a/0x130 net/socket.c:1040\n sock_read_iter+0x176/0x220 net/socket.c:1118\n call_read_iter include/linux/fs.h:1845 [inline]\n new_sync_read fs/read_write.c:389 [inline]\n vfs_read+0x5e0/0x630 fs/read_write.c:470\n ksys_read+0x163/0x1a0 fs/read_write.c:613\n __do_sys_read fs/read_write.c:623 [inline]\n __se_sys_read fs/read_write.c:621 [inline]\n __x64_sys_read+0x41/0x50 fs/read_write.c:621\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nread to 0xffff88803c81f258 of 8 bytes by task 19183 on cpu 1:\n sock_recv_cmsgs include/net/sock.h:2721 [inline]\n packet_recvmsg+0xb64/0xd00 net/packet/af_packet.c:3489\n sock_recvmsg_nosec net/socket.c:1019 [inline]\n sock_recvmsg+0x11a/0x130 net/socket.c:1040\n sock_read_iter+0x176/0x220 net/socket.c:1118\n call_read_iter include/linux/fs.h:1845 [inline]\n new_sync_read fs/read_write.c:389 [inline]\n vfs_read+0x5e0/0x630 fs/read_write.c:470\n ksys_read+0x163/0x1a0 fs/read_write.c:613\n __do_sys_read fs/read_write.c:623 [inline]\n __se_sys_read fs/read_write.c:621 [inline]\n __x64_sys_read+0x41/0x50 fs/read_write.c:621\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nvalue changed: 0xffffffffc4653600 -\u003e 0x0000000000000000\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 1 PID: 19183 Comm: syz-executor.5 Not tainted 6.3.0-rc7-02330-gca6270c12e20 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54218",
"url": "https://www.suse.com/security/cve/CVE-2023-54218"
},
{
"category": "external",
"summary": "SUSE Bug 1256229 for CVE-2023-54218",
"url": "https://bugzilla.suse.com/1256229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "low"
}
],
"title": "CVE-2023-54218"
},
{
"cve": "CVE-2023-54230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54230"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\namba: bus: fix refcount leak\n\ncommit 5de1540b7bc4 (\"drivers/amba: create devices from device tree\")\nincreases the refcount of of_node, but not releases it in\namba_device_release, so there is refcount leak. By using of_node_put\nto avoid refcount leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54230",
"url": "https://www.suse.com/security/cve/CVE-2023-54230"
},
{
"category": "external",
"summary": "SUSE Bug 1255925 for CVE-2023-54230",
"url": "https://bugzilla.suse.com/1255925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54230"
},
{
"cve": "CVE-2023-54243",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54243"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ebtables: fix table blob use-after-free\n\nWe are not allowed to return an error at this point.\nLooking at the code it looks like ret is always 0 at this\npoint, but its not.\n\nt = find_table_lock(net, repl-\u003ename, \u0026ret, \u0026ebt_mutex);\n\n... this can return a valid table, with ret != 0.\n\nThis bug causes update of table-\u003eprivate with the new\nblob, but then frees the blob right away in the caller.\n\nSyzbot report:\n\nBUG: KASAN: vmalloc-out-of-bounds in __ebt_unregister_table+0xc00/0xcd0 net/bridge/netfilter/ebtables.c:1168\nRead of size 4 at addr ffffc90005425000 by task kworker/u4:4/74\nWorkqueue: netns cleanup_net\nCall Trace:\n kasan_report+0xbf/0x1f0 mm/kasan/report.c:517\n __ebt_unregister_table+0xc00/0xcd0 net/bridge/netfilter/ebtables.c:1168\n ebt_unregister_table+0x35/0x40 net/bridge/netfilter/ebtables.c:1372\n ops_exit_list+0xb0/0x170 net/core/net_namespace.c:169\n cleanup_net+0x4ee/0xb10 net/core/net_namespace.c:613\n...\n\nip(6)tables appears to be ok (ret should be 0 at this point) but make\nthis more obvious.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54243",
"url": "https://www.suse.com/security/cve/CVE-2023-54243"
},
{
"category": "external",
"summary": "SUSE Bug 1255908 for CVE-2023-54243",
"url": "https://bugzilla.suse.com/1255908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54243"
},
{
"cve": "CVE-2023-54265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54265"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix an uninit variable access bug in __ip6_make_skb()\n\nSyzbot reported a bug as following:\n\n=====================================================\nBUG: KMSAN: uninit-value in arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline]\nBUG: KMSAN: uninit-value in arch_atomic_long_inc include/linux/atomic/atomic-long.h:161 [inline]\nBUG: KMSAN: uninit-value in atomic_long_inc include/linux/atomic/atomic-instrumented.h:1429 [inline]\nBUG: KMSAN: uninit-value in __ip6_make_skb+0x2f37/0x30f0 net/ipv6/ip6_output.c:1956\n arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline]\n arch_atomic_long_inc include/linux/atomic/atomic-long.h:161 [inline]\n atomic_long_inc include/linux/atomic/atomic-instrumented.h:1429 [inline]\n __ip6_make_skb+0x2f37/0x30f0 net/ipv6/ip6_output.c:1956\n ip6_finish_skb include/net/ipv6.h:1122 [inline]\n ip6_push_pending_frames+0x10e/0x550 net/ipv6/ip6_output.c:1987\n rawv6_push_pending_frames+0xb12/0xb90 net/ipv6/raw.c:579\n rawv6_sendmsg+0x297e/0x2e60 net/ipv6/raw.c:922\n inet_sendmsg+0x101/0x180 net/ipv4/af_inet.c:827\n sock_sendmsg_nosec net/socket.c:714 [inline]\n sock_sendmsg net/socket.c:734 [inline]\n ____sys_sendmsg+0xa8e/0xe70 net/socket.c:2476\n ___sys_sendmsg+0x2a1/0x3f0 net/socket.c:2530\n __sys_sendmsg net/socket.c:2559 [inline]\n __do_sys_sendmsg net/socket.c:2568 [inline]\n __se_sys_sendmsg net/socket.c:2566 [inline]\n __x64_sys_sendmsg+0x367/0x540 net/socket.c:2566\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUninit was created at:\n slab_post_alloc_hook mm/slab.h:766 [inline]\n slab_alloc_node mm/slub.c:3452 [inline]\n __kmem_cache_alloc_node+0x71f/0xce0 mm/slub.c:3491\n __do_kmalloc_node mm/slab_common.c:967 [inline]\n __kmalloc_node_track_caller+0x114/0x3b0 mm/slab_common.c:988\n kmalloc_reserve net/core/skbuff.c:492 [inline]\n __alloc_skb+0x3af/0x8f0 net/core/skbuff.c:565\n alloc_skb include/linux/skbuff.h:1270 [inline]\n __ip6_append_data+0x51c1/0x6bb0 net/ipv6/ip6_output.c:1684\n ip6_append_data+0x411/0x580 net/ipv6/ip6_output.c:1854\n rawv6_sendmsg+0x2882/0x2e60 net/ipv6/raw.c:915\n inet_sendmsg+0x101/0x180 net/ipv4/af_inet.c:827\n sock_sendmsg_nosec net/socket.c:714 [inline]\n sock_sendmsg net/socket.c:734 [inline]\n ____sys_sendmsg+0xa8e/0xe70 net/socket.c:2476\n ___sys_sendmsg+0x2a1/0x3f0 net/socket.c:2530\n __sys_sendmsg net/socket.c:2559 [inline]\n __do_sys_sendmsg net/socket.c:2568 [inline]\n __se_sys_sendmsg net/socket.c:2566 [inline]\n __x64_sys_sendmsg+0x367/0x540 net/socket.c:2566\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nIt is because icmp6hdr does not in skb linear region under the scenario\nof SOCK_RAW socket. Access icmp6_hdr(skb)-\u003eicmp6_type directly will\ntrigger the uninit variable access bug.\n\nUse a local variable icmp6_type to carry the correct value in different\nscenarios.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54265",
"url": "https://www.suse.com/security/cve/CVE-2023-54265"
},
{
"category": "external",
"summary": "SUSE Bug 1255874 for CVE-2023-54265",
"url": "https://bugzilla.suse.com/1255874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54265"
},
{
"cve": "CVE-2023-54274",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54274"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Add a check for valid \u0027mad_agent\u0027 pointer\n\nWhen unregistering MAD agent, srpt module has a non-null check\nfor \u0027mad_agent\u0027 pointer before invoking ib_unregister_mad_agent().\nThis check can pass if \u0027mad_agent\u0027 variable holds an error value.\nThe \u0027mad_agent\u0027 can have an error value for a short window when\nsrpt_add_one() and srpt_remove_one() is executed simultaneously.\n\nIn srpt module, added a valid pointer check for \u0027sport-\u003emad_agent\u0027\nbefore unregistering MAD agent.\n\nThis issue can hit when RoCE driver unregisters ib_device\n\nStack Trace:\n------------\nBUG: kernel NULL pointer dereference, address: 000000000000004d\nPGD 145003067 P4D 145003067 PUD 2324fe067 PMD 0\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCPU: 10 PID: 4459 Comm: kworker/u80:0 Kdump: loaded Tainted: P\nHardware name: Dell Inc. PowerEdge R640/06NR82, BIOS 2.5.4 01/13/2020\nWorkqueue: bnxt_re bnxt_re_task [bnxt_re]\nRIP: 0010:_raw_spin_lock_irqsave+0x19/0x40\nCall Trace:\n ib_unregister_mad_agent+0x46/0x2f0 [ib_core]\n IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready\n ? __schedule+0x20b/0x560\n srpt_unregister_mad_agent+0x93/0xd0 [ib_srpt]\n srpt_remove_one+0x20/0x150 [ib_srpt]\n remove_client_context+0x88/0xd0 [ib_core]\n bond0: (slave p2p1): link status definitely up, 100000 Mbps full duplex\n disable_device+0x8a/0x160 [ib_core]\n bond0: active interface up!\n ? kernfs_name_hash+0x12/0x80\n (NULL device *): Bonding Info Received: rdev: 000000006c0b8247\n __ib_unregister_device+0x42/0xb0 [ib_core]\n (NULL device *): Master: mode: 4 num_slaves:2\n ib_unregister_device+0x22/0x30 [ib_core]\n (NULL device *): Slave: id: 105069936 name:p2p1 link:0 state:0\n bnxt_re_stopqps_and_ib_uninit+0x83/0x90 [bnxt_re]\n bnxt_re_alloc_lag+0x12e/0x4e0 [bnxt_re]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54274",
"url": "https://www.suse.com/security/cve/CVE-2023-54274"
},
{
"category": "external",
"summary": "SUSE Bug 1255905 for CVE-2023-54274",
"url": "https://bugzilla.suse.com/1255905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54274"
},
{
"cve": "CVE-2023-54282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54282"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tuners: qt1010: replace BUG_ON with a regular error\n\nBUG_ON is unnecessary here, and in addition it confuses smatch.\nReplacing this with an error return help resolve this smatch\nwarning:\n\ndrivers/media/tuners/qt1010.c:350 qt1010_init() error: buffer overflow \u0027i2c_data\u0027 34 \u003c= 34",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54282",
"url": "https://www.suse.com/security/cve/CVE-2023-54282"
},
{
"category": "external",
"summary": "SUSE Bug 1255810 for CVE-2023-54282",
"url": "https://bugzilla.suse.com/1255810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "low"
}
],
"title": "CVE-2023-54282"
},
{
"cve": "CVE-2023-54287",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54287"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: imx: disable Ageing Timer interrupt request irq\n\nThere maybe pending USR interrupt before requesting irq, however\nuart_add_one_port has not executed, so there will be kernel panic:\n[ 0.795668] Unable to handle kernel NULL pointer dereference at virtual addre\nss 0000000000000080\n[ 0.802701] Mem abort info:\n[ 0.805367] ESR = 0x0000000096000004\n[ 0.808950] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 0.814033] SET = 0, FnV = 0\n[ 0.816950] EA = 0, S1PTW = 0\n[ 0.819950] FSC = 0x04: level 0 translation fault\n[ 0.824617] Data abort info:\n[ 0.827367] ISV = 0, ISS = 0x00000004\n[ 0.831033] CM = 0, WnR = 0\n[ 0.833866] [0000000000000080] user address but active_mm is swapper\n[ 0.839951] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP\n[ 0.845953] Modules linked in:\n[ 0.848869] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.1.1+g56321e101aca #1\n[ 0.855617] Hardware name: Freescale i.MX8MP EVK (DT)\n[ 0.860452] pstate: 000000c5 (nzcv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 0.867117] pc : __imx_uart_rxint.constprop.0+0x11c/0x2c0\n[ 0.872283] lr : imx_uart_int+0xf8/0x1ec\n\nThe issue only happends in the inmate linux when Jailhouse hypervisor\nenabled. The test procedure is:\nwhile true; do\n\tjailhouse enable imx8mp.cell\n\tjailhouse cell linux xxxx\n\tsleep 10\n\tjailhouse cell destroy 1\n\tjailhouse disable\n\tsleep 5\ndone\n\nAnd during the upper test, press keys to the 2nd linux console.\nWhen `jailhouse cell destroy 1`, the 2nd linux has no chance to put\nthe uart to a quiese state, so USR1/2 may has pending interrupts. Then\nwhen `jailhosue cell linux xx` to start 2nd linux again, the issue\ntrigger.\n\nIn order to disable irqs before requesting them, both UCR1 and UCR2 irqs\nshould be disabled, so here fix that, disable the Ageing Timer interrupt\nin UCR2 as UCR1 does.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54287",
"url": "https://www.suse.com/security/cve/CVE-2023-54287"
},
{
"category": "external",
"summary": "SUSE Bug 1255804 for CVE-2023-54287",
"url": "https://bugzilla.suse.com/1255804"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54287"
},
{
"cve": "CVE-2023-54311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54311"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix deadlock when converting an inline directory in nojournal mode\n\nIn no journal mode, ext4_finish_convert_inline_dir() can self-deadlock\nby calling ext4_handle_dirty_dirblock() when it already has taken the\ndirectory lock. There is a similar self-deadlock in\next4_incvert_inline_data_nolock() for data files which we\u0027ll fix at\nthe same time.\n\nA simple reproducer demonstrating the problem:\n\n mke2fs -Fq -t ext2 -O inline_data -b 4k /dev/vdc 64\n mount -t ext4 -o dirsync /dev/vdc /vdc\n cd /vdc\n mkdir file0\n cd file0\n touch file0\n touch file1\n attr -s BurnSpaceInEA -V abcde .\n touch supercalifragilisticexpialidocious",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54311",
"url": "https://www.suse.com/security/cve/CVE-2023-54311"
},
{
"category": "external",
"summary": "SUSE Bug 1255773 for CVE-2023-54311",
"url": "https://bugzilla.suse.com/1255773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54311"
},
{
"cve": "CVE-2023-54321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-54321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: fix potential null-ptr-deref in device_add()\n\nI got the following null-ptr-deref report while doing fault injection test:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000058\nCPU: 2 PID: 278 Comm: 37-i2c-ds2482 Tainted: G B W N 6.1.0-rc3+\nRIP: 0010:klist_put+0x2d/0xd0\nCall Trace:\n \u003cTASK\u003e\n klist_remove+0xf1/0x1c0\n device_release_driver_internal+0x196/0x210\n bus_remove_device+0x1bd/0x240\n device_add+0xd3d/0x1100\n w1_add_master_device+0x476/0x490 [wire]\n ds2482_probe+0x303/0x3e0 [ds2482]\n\nThis is how it happened:\n\nw1_alloc_dev()\n // The dev-\u003edriver is set to w1_master_driver.\n memcpy(\u0026dev-\u003edev, device, sizeof(struct device));\n device_add()\n bus_add_device()\n dpm_sysfs_add() // It fails, calls bus_remove_device.\n\n // error path\n bus_remove_device()\n // The dev-\u003edriver is not null, but driver is not bound.\n __device_release_driver()\n klist_remove(\u0026dev-\u003ep-\u003eknode_driver) \u003c-- It causes null-ptr-deref.\n\n // normal path\n bus_probe_device() // It\u0027s not called yet.\n device_bind_driver()\n\nIf dev-\u003edriver is set, in the error path after calling bus_add_device()\nin device_add(), bus_remove_device() is called, then the device will be\ndetached from driver. But device_bind_driver() is not called yet, so it\ncauses null-ptr-deref while access the \u0027knode_driver\u0027. To fix this, set\ndev-\u003edriver to null in the error path before calling bus_remove_device().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-54321",
"url": "https://www.suse.com/security/cve/CVE-2023-54321"
},
{
"category": "external",
"summary": "SUSE Bug 1255762 for CVE-2023-54321",
"url": "https://bugzilla.suse.com/1255762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-54321"
},
{
"cve": "CVE-2024-26832",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26832"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: zswap: fix missing folio cleanup in writeback race path\n\nIn zswap_writeback_entry(), after we get a folio from\n__read_swap_cache_async(), we grab the tree lock again to check that the\nswap entry was not invalidated and recycled. If it was, we delete the\nfolio we just added to the swap cache and exit.\n\nHowever, __read_swap_cache_async() returns the folio locked when it is\nnewly allocated, which is always true for this path, and the folio is\nref\u0027d. Make sure to unlock and put the folio before returning.\n\nThis was discovered by code inspection, probably because this path handles\na race condition that should not happen often, and the bug would not crash\nthe system, it will only strand the folio indefinitely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26832",
"url": "https://www.suse.com/security/cve/CVE-2024-26832"
},
{
"category": "external",
"summary": "SUSE Bug 1223007 for CVE-2024-26832",
"url": "https://bugzilla.suse.com/1223007"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26832"
},
{
"cve": "CVE-2024-26935",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26935"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix unremoved procfs host directory regression\n\nCommit fc663711b944 (\"scsi: core: Remove the /proc/scsi/${proc_name}\ndirectory earlier\") fixed a bug related to modules loading/unloading, by\nadding a call to scsi_proc_hostdir_rm() on scsi_remove_host(). But that led\nto a potential duplicate call to the hostdir_rm() routine, since it\u0027s also\ncalled from scsi_host_dev_release(). That triggered a regression report,\nwhich was then fixed by commit be03df3d4bfe (\"scsi: core: Fix a procfs host\ndirectory removal regression\"). The fix just dropped the hostdir_rm() call\nfrom dev_release().\n\nBut it happens that this proc directory is created on scsi_host_alloc(),\nand that function \"pairs\" with scsi_host_dev_release(), while\nscsi_remove_host() pairs with scsi_add_host(). In other words, it seems the\nreason for removing the proc directory on dev_release() was meant to cover\ncases in which a SCSI host structure was allocated, but the call to\nscsi_add_host() didn\u0027t happen. And that pattern happens to exist in some\nerror paths, for example.\n\nSyzkaller causes that by using USB raw gadget device, error\u0027ing on\nusb-storage driver, at usb_stor_probe2(). By checking that path, we can see\nthat the BadDevice label leads to a scsi_host_put() after a SCSI host\nallocation, but there\u0027s no call to scsi_add_host() in such path. That leads\nto messages like this in dmesg (and a leak of the SCSI host proc\nstructure):\n\nusb-storage 4-1:87.51: USB Mass Storage device detected\nproc_dir_entry \u0027scsi/usb-storage\u0027 already registered\nWARNING: CPU: 1 PID: 3519 at fs/proc/generic.c:377 proc_register+0x347/0x4e0 fs/proc/generic.c:376\n\nThe proper fix seems to still call scsi_proc_hostdir_rm() on dev_release(),\nbut guard that with the state check for SHOST_CREATED; there is even a\ncomment in scsi_host_dev_release() detailing that: such conditional is\nmeant for cases where the SCSI host was allocated but there was no calls to\n{add,remove}_host(), like the usb-storage case.\n\nThis is what we propose here and with that, the error path of usb-storage\ndoes not trigger the warning anymore.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26935",
"url": "https://www.suse.com/security/cve/CVE-2024-26935"
},
{
"category": "external",
"summary": "SUSE Bug 1223675 for CVE-2024-26935",
"url": "https://bugzilla.suse.com/1223675"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26935"
},
{
"cve": "CVE-2024-36903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36903"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix potential uninit-value access in __ip6_make_skb()\n\nAs it was done in commit fc1092f51567 (\"ipv4: Fix uninit-value access in\n__ip_make_skb()\") for IPv4, check FLOWI_FLAG_KNOWN_NH on fl6-\u003eflowi6_flags\ninstead of testing HDRINCL on the socket to avoid a race condition which\ncauses uninit-value access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36903",
"url": "https://www.suse.com/security/cve/CVE-2024-36903"
},
{
"category": "external",
"summary": "SUSE Bug 1225741 for CVE-2024-36903",
"url": "https://bugzilla.suse.com/1225741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36903"
},
{
"cve": "CVE-2024-41007",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-41007"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: avoid too many retransmit packets\n\nIf a TCP socket is using TCP_USER_TIMEOUT, and the other peer\nretracted its window to zero, tcp_retransmit_timer() can\nretransmit a packet every two jiffies (2 ms for HZ=1000),\nfor about 4 minutes after TCP_USER_TIMEOUT has \u0027expired\u0027.\n\nThe fix is to make sure tcp_rtx_probe0_timed_out() takes\nicsk-\u003eicsk_user_timeout into account.\n\nBefore blamed commit, the socket would not timeout after\nicsk-\u003eicsk_user_timeout, but would use standard exponential\nbackoff for the retransmits.\n\nAlso worth noting that before commit e89688e3e978 (\"net: tcp:\nfix unexcepted socket die when snd_wnd is 0\"), the issue\nwould last 2 minutes instead of 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-41007",
"url": "https://www.suse.com/security/cve/CVE-2024-41007"
},
{
"category": "external",
"summary": "SUSE Bug 1227863 for CVE-2024-41007",
"url": "https://bugzilla.suse.com/1227863"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "low"
}
],
"title": "CVE-2024-41007"
},
{
"cve": "CVE-2024-50040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Do not bring the device up after non-fatal error\n\nCommit 004d25060c78 (\"igb: Fix igb_down hung on surprise removal\")\nchanged igb_io_error_detected() to ignore non-fatal pcie errors in order\nto avoid hung task that can happen when igb_down() is called multiple\ntimes. This caused an issue when processing transient non-fatal errors.\nigb_io_resume(), which is called after igb_io_error_detected(), assumes\nthat device is brought down by igb_io_error_detected() if the interface\nis up. This resulted in panic with stacktrace below.\n\n[ T3256] igb 0000:09:00.0 haeth0: igb: haeth0 NIC Link is Down\n[ T292] pcieport 0000:00:1c.5: AER: Uncorrected (Non-Fatal) error received: 0000:09:00.0\n[ T292] igb 0000:09:00.0: PCIe Bus Error: severity=Uncorrected (Non-Fatal), type=Transaction Layer, (Requester ID)\n[ T292] igb 0000:09:00.0: device [8086:1537] error status/mask=00004000/00000000\n[ T292] igb 0000:09:00.0: [14] CmpltTO [ 200.105524,009][ T292] igb 0000:09:00.0: AER: TLP Header: 00000000 00000000 00000000 00000000\n[ T292] pcieport 0000:00:1c.5: AER: broadcast error_detected message\n[ T292] igb 0000:09:00.0: Non-correctable non-fatal error reported.\n[ T292] pcieport 0000:00:1c.5: AER: broadcast mmio_enabled message\n[ T292] pcieport 0000:00:1c.5: AER: broadcast resume message\n[ T292] ------------[ cut here ]------------\n[ T292] kernel BUG at net/core/dev.c:6539!\n[ T292] invalid opcode: 0000 [#1] PREEMPT SMP\n[ T292] RIP: 0010:napi_enable+0x37/0x40\n[ T292] Call Trace:\n[ T292] \u003cTASK\u003e\n[ T292] ? die+0x33/0x90\n[ T292] ? do_trap+0xdc/0x110\n[ T292] ? napi_enable+0x37/0x40\n[ T292] ? do_error_trap+0x70/0xb0\n[ T292] ? napi_enable+0x37/0x40\n[ T292] ? napi_enable+0x37/0x40\n[ T292] ? exc_invalid_op+0x4e/0x70\n[ T292] ? napi_enable+0x37/0x40\n[ T292] ? asm_exc_invalid_op+0x16/0x20\n[ T292] ? napi_enable+0x37/0x40\n[ T292] igb_up+0x41/0x150\n[ T292] igb_io_resume+0x25/0x70\n[ T292] report_resume+0x54/0x70\n[ T292] ? report_frozen_detected+0x20/0x20\n[ T292] pci_walk_bus+0x6c/0x90\n[ T292] ? aer_print_port_info+0xa0/0xa0\n[ T292] pcie_do_recovery+0x22f/0x380\n[ T292] aer_process_err_devices+0x110/0x160\n[ T292] aer_isr+0x1c1/0x1e0\n[ T292] ? disable_irq_nosync+0x10/0x10\n[ T292] irq_thread_fn+0x1a/0x60\n[ T292] irq_thread+0xe3/0x1a0\n[ T292] ? irq_set_affinity_notifier+0x120/0x120\n[ T292] ? irq_affinity_notify+0x100/0x100\n[ T292] kthread+0xe2/0x110\n[ T292] ? kthread_complete_and_exit+0x20/0x20\n[ T292] ret_from_fork+0x2d/0x50\n[ T292] ? kthread_complete_and_exit+0x20/0x20\n[ T292] ret_from_fork_asm+0x11/0x20\n[ T292] \u003c/TASK\u003e\n\nTo fix this issue igb_io_resume() checks if the interface is running and\nthe device is not down this means igb_io_error_detected() did not bring\nthe device down and there is no need to bring it up.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50040",
"url": "https://www.suse.com/security/cve/CVE-2024-50040"
},
{
"category": "external",
"summary": "SUSE Bug 1231908 for CVE-2024-50040",
"url": "https://bugzilla.suse.com/1231908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-50040"
},
{
"cve": "CVE-2024-56690",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56690"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY\n\nSince commit 8f4f68e788c3 (\"crypto: pcrypt - Fix hungtask for\nPADATA_RESET\"), the pcrypt encryption and decryption operations return\n-EAGAIN when the CPU goes online or offline. In alg_test(), a WARN is\ngenerated when pcrypt_aead_decrypt() or pcrypt_aead_encrypt() returns\n-EAGAIN, the unnecessary panic will occur when panic_on_warn set 1.\nFix this issue by calling crypto layer directly without parallelization\nin that case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56690",
"url": "https://www.suse.com/security/cve/CVE-2024-56690"
},
{
"category": "external",
"summary": "SUSE Bug 1235428 for CVE-2024-56690",
"url": "https://bugzilla.suse.com/1235428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-56690"
},
{
"cve": "CVE-2024-58020",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-58020"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: multitouch: Add NULL check in mt_input_configured\n\ndevm_kasprintf() can return a NULL pointer on failure,but this\nreturned value in mt_input_configured() is not checked.\nAdd NULL check in mt_input_configured(), to handle kernel NULL\npointer dereference error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-58020",
"url": "https://www.suse.com/security/cve/CVE-2024-58020"
},
{
"category": "external",
"summary": "SUSE Bug 1239346 for CVE-2024-58020",
"url": "https://bugzilla.suse.com/1239346"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-58020"
},
{
"cve": "CVE-2025-21681",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21681"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nopenvswitch: fix lockup on tx to unregistering netdev with carrier\n\nCommit in a fixes tag attempted to fix the issue in the following\nsequence of calls:\n\n do_output\n -\u003e ovs_vport_send\n -\u003e dev_queue_xmit\n -\u003e __dev_queue_xmit\n -\u003e netdev_core_pick_tx\n -\u003e skb_tx_hash\n\nWhen device is unregistering, the \u0027dev-\u003ereal_num_tx_queues\u0027 goes to\nzero and the \u0027while (unlikely(hash \u003e= qcount))\u0027 loop inside the\n\u0027skb_tx_hash\u0027 becomes infinite, locking up the core forever.\n\nBut unfortunately, checking just the carrier status is not enough to\nfix the issue, because some devices may still be in unregistering\nstate while reporting carrier status OK.\n\nOne example of such device is a net/dummy. It sets carrier ON\non start, but it doesn\u0027t implement .ndo_stop to set the carrier off.\nAnd it makes sense, because dummy doesn\u0027t really have a carrier.\nTherefore, while this device is unregistering, it\u0027s still easy to hit\nthe infinite loop in the skb_tx_hash() from the OVS datapath. There\nmight be other drivers that do the same, but dummy by itself is\nimportant for the OVS ecosystem, because it is frequently used as a\npacket sink for tcpdump while debugging OVS deployments. And when the\nissue is hit, the only way to recover is to reboot.\n\nFix that by also checking if the device is running. The running\nstate is handled by the net core during unregistering, so it covers\nunregistering case better, and we don\u0027t really need to send packets\nto devices that are not running anyway.\n\nWhile only checking the running state might be enough, the carrier\ncheck is preserved. The running and the carrier states seem disjoined\nthroughout the code and different drivers. And other core functions\nlike __dev_direct_xmit() check both before attempting to transmit\na packet. So, it seems safer to check both flags in OVS as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21681",
"url": "https://www.suse.com/security/cve/CVE-2025-21681"
},
{
"category": "external",
"summary": "SUSE Bug 1236702 for CVE-2025-21681",
"url": "https://bugzilla.suse.com/1236702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-21681"
},
{
"cve": "CVE-2025-37913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37913"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: qfq: Fix double list add in class with netem as child qdisc\n\nAs described in Gerrard\u0027s report [1], there are use cases where a netem\nchild qdisc will make the parent qdisc\u0027s enqueue callback reentrant.\nIn the case of qfq, there won\u0027t be a UAF, but the code will add the same\nclassifier to the list twice, which will cause memory corruption.\n\nThis patch checks whether the class was already added to the agg-\u003eactive\nlist (cl_is_active) before doing the addition to cater for the reentrant\ncase.\n\n[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37913",
"url": "https://www.suse.com/security/cve/CVE-2025-37913"
},
{
"category": "external",
"summary": "SUSE Bug 1243471 for CVE-2025-37913",
"url": "https://bugzilla.suse.com/1243471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-37913"
},
{
"cve": "CVE-2025-38007",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38007"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: uclogic: Add NULL check in uclogic_input_configured()\n\ndevm_kasprintf() returns NULL when memory allocation fails. Currently,\nuclogic_input_configured() does not check for this case, which results\nin a NULL pointer dereference.\n\nAdd NULL check after devm_kasprintf() to prevent this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38007",
"url": "https://www.suse.com/security/cve/CVE-2025-38007"
},
{
"category": "external",
"summary": "SUSE Bug 1244938 for CVE-2025-38007",
"url": "https://bugzilla.suse.com/1244938"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-38007"
},
{
"cve": "CVE-2025-38539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38539"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Add down_write(trace_event_sem) when adding trace event\n\nWhen a module is loaded, it adds trace events defined by the module. It\nmay also need to modify the modules trace printk formats to replace enum\nnames with their values.\n\nIf two modules are loaded at the same time, the adding of the event to the\nftrace_events list can corrupt the walking of the list in the code that is\nmodifying the printk format strings and crash the kernel.\n\nThe addition of the event should take the trace_event_sem for write while\nit adds the new event.\n\nAlso add a lockdep_assert_held() on that semaphore in\n__trace_add_event_dirs() as it iterates the list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38539",
"url": "https://www.suse.com/security/cve/CVE-2025-38539"
},
{
"category": "external",
"summary": "SUSE Bug 1248211 for CVE-2025-38539",
"url": "https://bugzilla.suse.com/1248211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-38539"
},
{
"cve": "CVE-2025-38591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38591"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject narrower access to pointer ctx fields\n\nThe following BPF program, simplified from a syzkaller repro, causes a\nkernel warning:\n\n r0 = *(u8 *)(r1 + 169);\n exit;\n\nWith pointer field sk being at offset 168 in __sk_buff. This access is\ndetected as a narrower read in bpf_skb_is_valid_access because it\ndoesn\u0027t match offsetof(struct __sk_buff, sk). It is therefore allowed\nand later proceeds to bpf_convert_ctx_access. Note that for the\n\"is_narrower_load\" case in the convert_ctx_accesses(), the insn-\u003eoff\nis aligned, so the cnt may not be 0 because it matches the\noffsetof(struct __sk_buff, sk) in the bpf_convert_ctx_access. However,\nthe target_size stays 0 and the verifier errors with a kernel warning:\n\n verifier bug: error during ctx access conversion(1)\n\nThis patch fixes that to return a proper \"invalid bpf_context access\noff=X size=Y\" error on the load instruction.\n\nThe same issue affects multiple other fields in context structures that\nallow narrow access. Some other non-affected fields (for sk_msg,\nsk_lookup, and sockopt) were also changed to use bpf_ctx_range_ptr for\nconsistency.\n\nNote this syzkaller crash was reported in the \"Closes\" link below, which\nused to be about a different bug, fixed in\ncommit fce7bd8e385a (\"bpf/verifier: Handle BPF_LOAD_ACQ instructions\nin insn_def_regno()\"). Because syzbot somehow confused the two bugs,\nthe new crash and repro didn\u0027t get reported to the mailing list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38591",
"url": "https://www.suse.com/security/cve/CVE-2025-38591"
},
{
"category": "external",
"summary": "SUSE Bug 1248363 for CVE-2025-38591",
"url": "https://bugzilla.suse.com/1248363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-38591"
},
{
"cve": "CVE-2025-38602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38602"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niwlwifi: Add missing check for alloc_ordered_workqueue\n\nAdd check for the return value of alloc_ordered_workqueue since it may\nreturn NULL pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38602",
"url": "https://www.suse.com/security/cve/CVE-2025-38602"
},
{
"category": "external",
"summary": "SUSE Bug 1248341 for CVE-2025-38602",
"url": "https://bugzilla.suse.com/1248341"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-38602"
},
{
"cve": "CVE-2025-38656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38656"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start()\n\nPreserve the error code if iwl_setup_deferred_work() fails. The current\ncode returns ERR_PTR(0) (which is NULL) on this path. I believe the\nmissing error code potentially leads to a use after free involving\ndebugfs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38656",
"url": "https://www.suse.com/security/cve/CVE-2025-38656"
},
{
"category": "external",
"summary": "SUSE Bug 1248643 for CVE-2025-38656",
"url": "https://bugzilla.suse.com/1248643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-38656"
},
{
"cve": "CVE-2025-39689",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39689"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Also allocate and copy hash for reading of filter files\n\nCurrently the reader of set_ftrace_filter and set_ftrace_notrace just adds\nthe pointer to the global tracer hash to its iterator. Unlike the writer\nthat allocates a copy of the hash, the reader keeps the pointer to the\nfilter hashes. This is problematic because this pointer is static across\nfunction calls that release the locks that can update the global tracer\nhashes. This can cause UAF and similar bugs.\n\nAllocate and copy the hash for reading the filter files like it is done\nfor the writers. This not only fixes UAF bugs, but also makes the code a\nbit simpler as it doesn\u0027t have to differentiate when to free the\niterator\u0027s hash between writers and readers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39689",
"url": "https://www.suse.com/security/cve/CVE-2025-39689"
},
{
"category": "external",
"summary": "SUSE Bug 1249307 for CVE-2025-39689",
"url": "https://bugzilla.suse.com/1249307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-39689"
},
{
"cve": "CVE-2025-39813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39813"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix potential warning in trace_printk_seq during ftrace_dump\n\nWhen calling ftrace_dump_one() concurrently with reading trace_pipe,\na WARN_ON_ONCE() in trace_printk_seq() can be triggered due to a race\ncondition.\n\nThe issue occurs because:\n\nCPU0 (ftrace_dump) CPU1 (reader)\necho z \u003e /proc/sysrq-trigger\n\n!trace_empty(\u0026iter)\ntrace_iterator_reset(\u0026iter) \u003c- len = size = 0\n cat /sys/kernel/tracing/trace_pipe\ntrace_find_next_entry_inc(\u0026iter)\n __find_next_entry\n ring_buffer_empty_cpu \u003c- all empty\n return NULL\n\ntrace_printk_seq(\u0026iter.seq)\n WARN_ON_ONCE(s-\u003eseq.len \u003e= s-\u003eseq.size)\n\nIn the context between trace_empty() and trace_find_next_entry_inc()\nduring ftrace_dump, the ring buffer data was consumed by other readers.\nThis caused trace_find_next_entry_inc to return NULL, failing to populate\n`iter.seq`. At this point, due to the prior trace_iterator_reset, both\n`iter.seq.len` and `iter.seq.size` were set to 0. Since they are equal,\nthe WARN_ON_ONCE condition is triggered.\n\nMove the trace_printk_seq() into the if block that checks to make sure the\nreturn value of trace_find_next_entry_inc() is non-NULL in\nftrace_dump_one(), ensuring the \u0027iter.seq\u0027 is properly populated before\nsubsequent operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39813",
"url": "https://www.suse.com/security/cve/CVE-2025-39813"
},
{
"category": "external",
"summary": "SUSE Bug 1250032 for CVE-2025-39813",
"url": "https://bugzilla.suse.com/1250032"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-39813"
},
{
"cve": "CVE-2025-39829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39829"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntrace/fgraph: Fix the warning caused by missing unregister notifier\n\nThis warning was triggered during testing on v6.16:\n\nnotifier callback ftrace_suspend_notifier_call already registered\nWARNING: CPU: 2 PID: 86 at kernel/notifier.c:23 notifier_chain_register+0x44/0xb0\n...\nCall Trace:\n \u003cTASK\u003e\n blocking_notifier_chain_register+0x34/0x60\n register_ftrace_graph+0x330/0x410\n ftrace_profile_write+0x1e9/0x340\n vfs_write+0xf8/0x420\n ? filp_flush+0x8a/0xa0\n ? filp_close+0x1f/0x30\n ? do_dup2+0xaf/0x160\n ksys_write+0x65/0xe0\n do_syscall_64+0xa4/0x260\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nWhen writing to the function_profile_enabled interface, the notifier was\nnot unregistered after start_graph_tracing failed, causing a warning the\nnext time function_profile_enabled was written.\n\nFixed by adding unregister_pm_notifier in the exception path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39829",
"url": "https://www.suse.com/security/cve/CVE-2025-39829"
},
{
"category": "external",
"summary": "SUSE Bug 1250082 for CVE-2025-39829",
"url": "https://bugzilla.suse.com/1250082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-39829"
},
{
"cve": "CVE-2025-39913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39913"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork.\n\nsyzbot reported the splat below. [0]\n\nThe repro does the following:\n\n 1. Load a sk_msg prog that calls bpf_msg_cork_bytes(msg, cork_bytes)\n 2. Attach the prog to a SOCKMAP\n 3. Add a socket to the SOCKMAP\n 4. Activate fault injection\n 5. Send data less than cork_bytes\n\nAt 5., the data is carried over to the next sendmsg() as it is\nsmaller than the cork_bytes specified by bpf_msg_cork_bytes().\n\nThen, tcp_bpf_send_verdict() tries to allocate psock-\u003ecork to hold\nthe data, but this fails silently due to fault injection + __GFP_NOWARN.\n\nIf the allocation fails, we need to revert the sk-\u003esk_forward_alloc\nchange done by sk_msg_alloc().\n\nLet\u0027s call sk_msg_free() when tcp_bpf_send_verdict fails to allocate\npsock-\u003ecork.\n\nThe \"*copied\" also needs to be updated such that a proper error can\nbe returned to the caller, sendmsg. It fails to allocate psock-\u003ecork.\nNothing has been corked so far, so this patch simply sets \"*copied\"\nto 0.\n\n[0]:\nWARNING: net/ipv4/af_inet.c:156 at inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156, CPU#1: syz-executor/5983\nModules linked in:\nCPU: 1 UID: 0 PID: 5983 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156\nCode: 0f 0b 90 e9 62 fe ff ff e8 7a db b5 f7 90 0f 0b 90 e9 95 fe ff ff e8 6c db b5 f7 90 0f 0b 90 e9 bb fe ff ff e8 5e db b5 f7 90 \u003c0f\u003e 0b 90 e9 e1 fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 9f fc\nRSP: 0018:ffffc90000a08b48 EFLAGS: 00010246\nRAX: ffffffff8a09d0b2 RBX: dffffc0000000000 RCX: ffff888024a23c80\nRDX: 0000000000000100 RSI: 0000000000000fff RDI: 0000000000000000\nRBP: 0000000000000fff R08: ffff88807e07c627 R09: 1ffff1100fc0f8c4\nR10: dffffc0000000000 R11: ffffed100fc0f8c5 R12: ffff88807e07c380\nR13: dffffc0000000000 R14: ffff88807e07c60c R15: 1ffff1100fc0f872\nFS: 00005555604c4500(0000) GS:ffff888125af1000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005555604df5c8 CR3: 0000000032b06000 CR4: 00000000003526f0\nCall Trace:\n \u003cIRQ\u003e\n __sk_destruct+0x86/0x660 net/core/sock.c:2339\n rcu_do_batch kernel/rcu/tree.c:2605 [inline]\n rcu_core+0xca8/0x1770 kernel/rcu/tree.c:2861\n handle_softirqs+0x286/0x870 kernel/softirq.c:579\n __do_softirq kernel/softirq.c:613 [inline]\n invoke_softirq kernel/softirq.c:453 [inline]\n __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680\n irq_exit_rcu+0x9/0x30 kernel/softirq.c:696\n instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline]\n sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39913",
"url": "https://www.suse.com/security/cve/CVE-2025-39913"
},
{
"category": "external",
"summary": "SUSE Bug 1250705 for CVE-2025-39913",
"url": "https://bugzilla.suse.com/1250705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-39913"
},
{
"cve": "CVE-2025-40087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40087"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Define a proc_layoutcommit for the FlexFiles layout type\n\nAvoid a crash if a pNFS client should happen to send a LAYOUTCOMMIT\noperation on a FlexFiles layout.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40087",
"url": "https://www.suse.com/security/cve/CVE-2025-40087"
},
{
"category": "external",
"summary": "SUSE Bug 1252909 for CVE-2025-40087",
"url": "https://bugzilla.suse.com/1252909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-40087"
},
{
"cve": "CVE-2025-40088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40088"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()\n\nThe hfsplus_strcasecmp() logic can trigger the issue:\n\n[ 117.317703][ T9855] ==================================================================\n[ 117.318353][ T9855] BUG: KASAN: slab-out-of-bounds in hfsplus_strcasecmp+0x1bc/0x490\n[ 117.318991][ T9855] Read of size 2 at addr ffff88802160f40c by task repro/9855\n[ 117.319577][ T9855]\n[ 117.319773][ T9855] CPU: 0 UID: 0 PID: 9855 Comm: repro Not tainted 6.17.0-rc6 #33 PREEMPT(full)\n[ 117.319780][ T9855] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 117.319783][ T9855] Call Trace:\n[ 117.319785][ T9855] \u003cTASK\u003e\n[ 117.319788][ T9855] dump_stack_lvl+0x1c1/0x2a0\n[ 117.319795][ T9855] ? __virt_addr_valid+0x1c8/0x5c0\n[ 117.319803][ T9855] ? __pfx_dump_stack_lvl+0x10/0x10\n[ 117.319808][ T9855] ? rcu_is_watching+0x15/0xb0\n[ 117.319816][ T9855] ? lock_release+0x4b/0x3e0\n[ 117.319821][ T9855] ? __kasan_check_byte+0x12/0x40\n[ 117.319828][ T9855] ? __virt_addr_valid+0x1c8/0x5c0\n[ 117.319835][ T9855] ? __virt_addr_valid+0x4a5/0x5c0\n[ 117.319842][ T9855] print_report+0x17e/0x7e0\n[ 117.319848][ T9855] ? __virt_addr_valid+0x1c8/0x5c0\n[ 117.319855][ T9855] ? __virt_addr_valid+0x4a5/0x5c0\n[ 117.319862][ T9855] ? __phys_addr+0xd3/0x180\n[ 117.319869][ T9855] ? hfsplus_strcasecmp+0x1bc/0x490\n[ 117.319876][ T9855] kasan_report+0x147/0x180\n[ 117.319882][ T9855] ? hfsplus_strcasecmp+0x1bc/0x490\n[ 117.319891][ T9855] hfsplus_strcasecmp+0x1bc/0x490\n[ 117.319900][ T9855] ? __pfx_hfsplus_cat_case_cmp_key+0x10/0x10\n[ 117.319906][ T9855] hfs_find_rec_by_key+0xa9/0x1e0\n[ 117.319913][ T9855] __hfsplus_brec_find+0x18e/0x470\n[ 117.319920][ T9855] ? __pfx_hfsplus_bnode_find+0x10/0x10\n[ 117.319926][ T9855] ? __pfx_hfs_find_rec_by_key+0x10/0x10\n[ 117.319933][ T9855] ? __pfx___hfsplus_brec_find+0x10/0x10\n[ 117.319942][ T9855] hfsplus_brec_find+0x28f/0x510\n[ 117.319949][ T9855] ? __pfx_hfs_find_rec_by_key+0x10/0x10\n[ 117.319956][ T9855] ? __pfx_hfsplus_brec_find+0x10/0x10\n[ 117.319963][ T9855] ? __kmalloc_noprof+0x2a9/0x510\n[ 117.319969][ T9855] ? hfsplus_find_init+0x8c/0x1d0\n[ 117.319976][ T9855] hfsplus_brec_read+0x2b/0x120\n[ 117.319983][ T9855] hfsplus_lookup+0x2aa/0x890\n[ 117.319990][ T9855] ? __pfx_hfsplus_lookup+0x10/0x10\n[ 117.320003][ T9855] ? d_alloc_parallel+0x2f0/0x15e0\n[ 117.320008][ T9855] ? __lock_acquire+0xaec/0xd80\n[ 117.320013][ T9855] ? __pfx_d_alloc_parallel+0x10/0x10\n[ 117.320019][ T9855] ? __raw_spin_lock_init+0x45/0x100\n[ 117.320026][ T9855] ? __init_waitqueue_head+0xa9/0x150\n[ 117.320034][ T9855] __lookup_slow+0x297/0x3d0\n[ 117.320039][ T9855] ? __pfx___lookup_slow+0x10/0x10\n[ 117.320045][ T9855] ? down_read+0x1ad/0x2e0\n[ 117.320055][ T9855] lookup_slow+0x53/0x70\n[ 117.320065][ T9855] walk_component+0x2f0/0x430\n[ 117.320073][ T9855] path_lookupat+0x169/0x440\n[ 117.320081][ T9855] filename_lookup+0x212/0x590\n[ 117.320089][ T9855] ? __pfx_filename_lookup+0x10/0x10\n[ 117.320098][ T9855] ? strncpy_from_user+0x150/0x290\n[ 117.320105][ T9855] ? getname_flags+0x1e5/0x540\n[ 117.320112][ T9855] user_path_at+0x3a/0x60\n[ 117.320117][ T9855] __x64_sys_umount+0xee/0x160\n[ 117.320123][ T9855] ? __pfx___x64_sys_umount+0x10/0x10\n[ 117.320129][ T9855] ? do_syscall_64+0xb7/0x3a0\n[ 117.320135][ T9855] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 117.320141][ T9855] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 117.320145][ T9855] do_syscall_64+0xf3/0x3a0\n[ 117.320150][ T9855] ? exc_page_fault+0x9f/0xf0\n[ 117.320154][ T9855] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 117.320158][ T9855] RIP: 0033:0x7f7dd7908b07\n[ 117.320163][ T9855] Code: 23 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 08\n[ 117.320167][ T9855] RSP: 002b:00007ffd5ebd9698 EFLAGS: 00000202 \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40088",
"url": "https://www.suse.com/security/cve/CVE-2025-40088"
},
{
"category": "external",
"summary": "SUSE Bug 1252904 for CVE-2025-40088",
"url": "https://bugzilla.suse.com/1252904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-40088"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40259",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40259"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sg: Do not sleep in atomic context\n\nsg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may\nsleep. Hence, call sg_finish_rem_req() with interrupts enabled instead\nof disabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40259",
"url": "https://www.suse.com/security/cve/CVE-2025-40259"
},
{
"category": "external",
"summary": "SUSE Bug 1254845 for CVE-2025-40259",
"url": "https://bugzilla.suse.com/1254845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-40259"
},
{
"cve": "CVE-2025-40261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40261"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: nvme-fc: Ensure -\u003eioerr_work is cancelled in nvme_fc_delete_ctrl()\n\nnvme_fc_delete_assocation() waits for pending I/O to complete before\nreturning, and an error can cause -\u003eioerr_work to be queued after\ncancel_work_sync() had been called. Move the call to cancel_work_sync() to\nbe after nvme_fc_delete_association() to ensure -\u003eioerr_work is not running\nwhen the nvme_fc_ctrl object is freed. Otherwise the following can occur:\n\n[ 1135.911754] list_del corruption, ff2d24c8093f31f8-\u003enext is NULL\n[ 1135.917705] ------------[ cut here ]------------\n[ 1135.922336] kernel BUG at lib/list_debug.c:52!\n[ 1135.926784] Oops: invalid opcode: 0000 [#1] SMP NOPTI\n[ 1135.931851] CPU: 48 UID: 0 PID: 726 Comm: kworker/u449:23 Kdump: loaded Not tainted 6.12.0 #1 PREEMPT(voluntary)\n[ 1135.943490] Hardware name: Dell Inc. PowerEdge R660/0HGTK9, BIOS 2.5.4 01/16/2025\n[ 1135.950969] Workqueue: 0x0 (nvme-wq)\n[ 1135.954673] RIP: 0010:__list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1135.961041] Code: c7 c7 98 68 72 94 e8 26 45 fe ff 0f 0b 48 c7 c7 70 68 72 94 e8 18 45 fe ff 0f 0b 48 89 fe 48 c7 c7 80 69 72 94 e8 07 45 fe ff \u003c0f\u003e 0b 48 89 d1 48 c7 c7 a0 6a 72 94 48 89 c2 e8 f3 44 fe ff 0f 0b\n[ 1135.979788] RSP: 0018:ff579b19482d3e50 EFLAGS: 00010046\n[ 1135.985015] RAX: 0000000000000033 RBX: ff2d24c8093f31f0 RCX: 0000000000000000\n[ 1135.992148] RDX: 0000000000000000 RSI: ff2d24d6bfa1d0c0 RDI: ff2d24d6bfa1d0c0\n[ 1135.999278] RBP: ff2d24c8093f31f8 R08: 0000000000000000 R09: ffffffff951e2b08\n[ 1136.006413] R10: ffffffff95122ac8 R11: 0000000000000003 R12: ff2d24c78697c100\n[ 1136.013546] R13: fffffffffffffff8 R14: 0000000000000000 R15: ff2d24c78697c0c0\n[ 1136.020677] FS: 0000000000000000(0000) GS:ff2d24d6bfa00000(0000) knlGS:0000000000000000\n[ 1136.028765] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1136.034510] CR2: 00007fd207f90b80 CR3: 000000163ea22003 CR4: 0000000000f73ef0\n[ 1136.041641] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 1136.048776] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\n[ 1136.055910] PKRU: 55555554\n[ 1136.058623] Call Trace:\n[ 1136.061074] \u003cTASK\u003e\n[ 1136.063179] ? show_trace_log_lvl+0x1b0/0x2f0\n[ 1136.067540] ? show_trace_log_lvl+0x1b0/0x2f0\n[ 1136.071898] ? move_linked_works+0x4a/0xa0\n[ 1136.075998] ? __list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1136.081744] ? __die_body.cold+0x8/0x12\n[ 1136.085584] ? die+0x2e/0x50\n[ 1136.088469] ? do_trap+0xca/0x110\n[ 1136.091789] ? do_error_trap+0x65/0x80\n[ 1136.095543] ? __list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1136.101289] ? exc_invalid_op+0x50/0x70\n[ 1136.105127] ? __list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1136.110874] ? asm_exc_invalid_op+0x1a/0x20\n[ 1136.115059] ? __list_del_entry_valid_or_report.cold+0xf/0x6f\n[ 1136.120806] move_linked_works+0x4a/0xa0\n[ 1136.124733] worker_thread+0x216/0x3a0\n[ 1136.128485] ? __pfx_worker_thread+0x10/0x10\n[ 1136.132758] kthread+0xfa/0x240\n[ 1136.135904] ? __pfx_kthread+0x10/0x10\n[ 1136.139657] ret_from_fork+0x31/0x50\n[ 1136.143236] ? __pfx_kthread+0x10/0x10\n[ 1136.146988] ret_from_fork_asm+0x1a/0x30\n[ 1136.150915] \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40261",
"url": "https://www.suse.com/security/cve/CVE-2025-40261"
},
{
"category": "external",
"summary": "SUSE Bug 1254839 for CVE-2025-40261",
"url": "https://bugzilla.suse.com/1254839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-40261"
},
{
"cve": "CVE-2025-40264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40264"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: pass wrb_params in case of OS2BMC\n\nbe_insert_vlan_in_pkt() is called with the wrb_params argument being NULL\nat be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL\npointer when processing a workaround for specific packet, as commit\nbc0c3405abbb (\"be2net: fix a Tx stall bug caused by a specific ipv6\npacket\") states.\n\nThe correct way would be to pass the wrb_params from be_xmit().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40264",
"url": "https://www.suse.com/security/cve/CVE-2025-40264"
},
{
"category": "external",
"summary": "SUSE Bug 1254835 for CVE-2025-40264",
"url": "https://bugzilla.suse.com/1254835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-40264"
},
{
"cve": "CVE-2025-40271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40271"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/proc: fix uaf in proc_readdir_de()\n\nPde is erased from subdir rbtree through rb_erase(), but not set the node\nto EMPTY, which may result in uaf access. We should use RB_CLEAR_NODE()\nset the erased node to EMPTY, then pde_subdir_next() will return NULL to\navoid uaf access.\n\nWe found an uaf issue while using stress-ng testing, need to run testcase\ngetdent and tun in the same time. The steps of the issue is as follows:\n\n1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current\n pde is tun3;\n\n2) in the [time windows] unregister netdevice tun3 and tun2, and erase\n them from rbtree. erase tun3 first, and then erase tun2. the\n pde(tun2) will be released to slab;\n\n3) continue to getdent process, then pde_subdir_next() will return\n pde(tun2) which is released, it will case uaf access.\n\nCPU 0 | CPU 1\n-------------------------------------------------------------------------\ntraverse dir /proc/pid/net/dev_snmp6/ | unregister_netdevice(tun-\u003edev) //tun3 tun2\nsys_getdents64() |\n iterate_dir() |\n proc_readdir() |\n proc_readdir_de() | snmp6_unregister_dev()\n pde_get(de); | proc_remove()\n read_unlock(\u0026proc_subdir_lock); | remove_proc_subtree()\n | write_lock(\u0026proc_subdir_lock);\n [time window] | rb_erase(\u0026root-\u003esubdir_node, \u0026parent-\u003esubdir);\n | write_unlock(\u0026proc_subdir_lock);\n read_lock(\u0026proc_subdir_lock); |\n next = pde_subdir_next(de); |\n pde_put(de); |\n de = next; //UAF |\n\nrbtree of dev_snmp6\n |\n pde(tun3)\n / \\\n NULL pde(tun2)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40271",
"url": "https://www.suse.com/security/cve/CVE-2025-40271"
},
{
"category": "external",
"summary": "SUSE Bug 1255297 for CVE-2025-40271",
"url": "https://bugzilla.suse.com/1255297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-40271"
},
{
"cve": "CVE-2025-40323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40323"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: Set fb_display[i]-\u003emode to NULL when the mode is released\n\nRecently, we discovered the following issue through syzkaller:\n\nBUG: KASAN: slab-use-after-free in fb_mode_is_equal+0x285/0x2f0\nRead of size 4 at addr ff11000001b3c69c by task syz.xxx\n...\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xab/0xe0\n print_address_description.constprop.0+0x2c/0x390\n print_report+0xb9/0x280\n kasan_report+0xb8/0xf0\n fb_mode_is_equal+0x285/0x2f0\n fbcon_mode_deleted+0x129/0x180\n fb_set_var+0xe7f/0x11d0\n do_fb_ioctl+0x6a0/0x750\n fb_ioctl+0xe0/0x140\n __x64_sys_ioctl+0x193/0x210\n do_syscall_64+0x5f/0x9c0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nBased on experimentation and analysis, during framebuffer unregistration,\nonly the memory of fb_info-\u003emodelist is freed, without setting the\ncorresponding fb_display[i]-\u003emode to NULL for the freed modes. This leads\nto UAF issues during subsequent accesses. Here\u0027s an example of reproduction\nsteps:\n1. With /dev/fb0 already registered in the system, load a kernel module\n to register a new device /dev/fb1;\n2. Set fb1\u0027s mode to the global fb_display[] array (via FBIOPUT_CON2FBMAP);\n3. Switch console from fb to VGA (to allow normal rmmod of the ko);\n4. Unload the kernel module, at this point fb1\u0027s modelist is freed, leaving\n a wild pointer in fb_display[];\n5. Trigger the bug via system calls through fb0 attempting to delete a mode\n from fb0.\n\nAdd a check in do_unregister_framebuffer(): if the mode to be freed exists\nin fb_display[], set the corresponding mode pointer to NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40323",
"url": "https://www.suse.com/security/cve/CVE-2025-40323"
},
{
"category": "external",
"summary": "SUSE Bug 1255094 for CVE-2025-40323",
"url": "https://bugzilla.suse.com/1255094"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-40323"
},
{
"cve": "CVE-2025-40339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40339"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix nullptr err of vm_handle_moved\n\nIf a amdgpu_bo_va is fpriv-\u003eprt_va, the bo of this one is always NULL.\nSo, such kind of amdgpu_bo_va should be updated separately before\namdgpu_vm_handle_moved.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40339",
"url": "https://www.suse.com/security/cve/CVE-2025-40339"
},
{
"category": "external",
"summary": "SUSE Bug 1255428 for CVE-2025-40339",
"url": "https://bugzilla.suse.com/1255428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-40339"
},
{
"cve": "CVE-2025-40345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40345"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: storage: sddr55: Reject out-of-bound new_pba\n\nDiscovered by Atuin - Automated Vulnerability Discovery Engine.\n\nnew_pba comes from the status packet returned after each write.\nA bogus device could report values beyond the block count derived\nfrom info-\u003ecapacity, letting the driver walk off the end of\npba_to_lba[] and corrupt heap memory.\n\nReject PBAs that exceed the computed block count and fail the\ntransfer so we avoid touching out-of-range mapping entries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40345",
"url": "https://www.suse.com/security/cve/CVE-2025-40345"
},
{
"category": "external",
"summary": "SUSE Bug 1255279 for CVE-2025-40345",
"url": "https://bugzilla.suse.com/1255279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-40345"
},
{
"cve": "CVE-2025-40363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40363"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv6: fix field-spanning memcpy warning in AH output\n\nFix field-spanning memcpy warnings in ah6_output() and\nah6_output_done() where extension headers are copied to/from IPv6\naddress fields, triggering fortify-string warnings about writes beyond\nthe 16-byte address fields.\n\n memcpy: detected field-spanning write (size 40) of single field \"\u0026top_iph-\u003esaddr\" at net/ipv6/ah6.c:439 (size 16)\n WARNING: CPU: 0 PID: 8838 at net/ipv6/ah6.c:439 ah6_output+0xe7e/0x14e0 net/ipv6/ah6.c:439\n\nThe warnings are false positives as the extension headers are\nintentionally placed after the IPv6 header in memory. Fix by properly\ncopying addresses and extension headers separately, and introduce\nhelper functions to avoid code duplication.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40363",
"url": "https://www.suse.com/security/cve/CVE-2025-40363"
},
{
"category": "external",
"summary": "SUSE Bug 1255102 for CVE-2025-40363",
"url": "https://bugzilla.suse.com/1255102"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "low"
}
],
"title": "CVE-2025-40363"
},
{
"cve": "CVE-2025-68188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()\n\nUse RCU to avoid a pair of atomic operations and a potential\nUAF on dst_dev()-\u003eflags.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68188",
"url": "https://www.suse.com/security/cve/CVE-2025-68188"
},
{
"category": "external",
"summary": "SUSE Bug 1255269 for CVE-2025-68188",
"url": "https://bugzilla.suse.com/1255269"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68188"
},
{
"cve": "CVE-2025-68190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68190"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked()\n\nkcalloc() may fail. When WS is non-zero and allocation fails, ectx.ws\nremains NULL while ectx.ws_size is set, leading to a potential NULL\npointer dereference in atom_get_src_int() when accessing WS entries.\n\nReturn -ENOMEM on allocation failure to avoid the NULL dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68190",
"url": "https://www.suse.com/security/cve/CVE-2025-68190"
},
{
"category": "external",
"summary": "SUSE Bug 1255131 for CVE-2025-68190",
"url": "https://bugzilla.suse.com/1255131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68190"
},
{
"cve": "CVE-2025-68192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup\n\nRaw IP packets have no MAC header, leaving skb-\u003emac_header uninitialized.\nThis can trigger kernel panics on ARM64 when xfrm or other subsystems\naccess the offset due to strict alignment checks.\n\nInitialize the MAC header to prevent such crashes.\n\nThis can trigger kernel panics on ARM when running IPsec over the\nqmimux0 interface.\n\nExample trace:\n\n Internal error: Oops: 000000009600004f [#1] SMP\n CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.34-gbe78e49cb433 #1\n Hardware name: LS1028A RDB Board (DT)\n pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : xfrm_input+0xde8/0x1318\n lr : xfrm_input+0x61c/0x1318\n sp : ffff800080003b20\n Call trace:\n xfrm_input+0xde8/0x1318\n xfrm6_rcv+0x38/0x44\n xfrm6_esp_rcv+0x48/0xa8\n ip6_protocol_deliver_rcu+0x94/0x4b0\n ip6_input_finish+0x44/0x70\n ip6_input+0x44/0xc0\n ipv6_rcv+0x6c/0x114\n __netif_receive_skb_one_core+0x5c/0x8c\n __netif_receive_skb+0x18/0x60\n process_backlog+0x78/0x17c\n __napi_poll+0x38/0x180\n net_rx_action+0x168/0x2f0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68192",
"url": "https://www.suse.com/security/cve/CVE-2025-68192"
},
{
"category": "external",
"summary": "SUSE Bug 1255246 for CVE-2025-68192",
"url": "https://bugzilla.suse.com/1255246"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68192"
},
{
"cve": "CVE-2025-68241",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68241"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe\n\nThe sit driver\u0027s packet transmission path calls: sit_tunnel_xmit() -\u003e\nupdate_or_create_fnhe(), which lead to fnhe_remove_oldest() being called\nto delete entries exceeding FNHE_RECLAIM_DEPTH+random.\n\nThe race window is between fnhe_remove_oldest() selecting fnheX for\ndeletion and the subsequent kfree_rcu(). During this time, the\nconcurrent path\u0027s __mkroute_output() -\u003e find_exception() can fetch the\nsoon-to-be-deleted fnheX, and rt_bind_exception() then binds it with a\nnew dst using a dst_hold(). When the original fnheX is freed via RCU,\nthe dst reference remains permanently leaked.\n\nCPU 0 CPU 1\n__mkroute_output()\n find_exception() [fnheX]\n update_or_create_fnhe()\n fnhe_remove_oldest() [fnheX]\n rt_bind_exception() [bind dst]\n RCU callback [fnheX freed, dst leak]\n\nThis issue manifests as a device reference count leak and a warning in\ndmesg when unregistering the net device:\n\n unregister_netdevice: waiting for sitX to become free. Usage count = N\n\nIdo Schimmel provided the simple test validation method [1].\n\nThe fix clears \u0027oldest-\u003efnhe_daddr\u0027 before calling fnhe_flush_routes().\nSince rt_bind_exception() checks this field, setting it to zero prevents\nthe stale fnhe from being reused and bound to a new dst just before it\nis freed.\n\n[1]\nip netns add ns1\nip -n ns1 link set dev lo up\nip -n ns1 address add 192.0.2.1/32 dev lo\nip -n ns1 link add name dummy1 up type dummy\nip -n ns1 route add 192.0.2.2/32 dev dummy1\nip -n ns1 link add name gretap1 up arp off type gretap \\\n local 192.0.2.1 remote 192.0.2.2\nip -n ns1 route add 198.51.0.0/16 dev gretap1\ntaskset -c 0 ip netns exec ns1 mausezahn gretap1 \\\n -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q \u0026\ntaskset -c 2 ip netns exec ns1 mausezahn gretap1 \\\n -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q \u0026\nsleep 10\nip netns pids ns1 | xargs kill\nip netns del ns1",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68241",
"url": "https://www.suse.com/security/cve/CVE-2025-68241"
},
{
"category": "external",
"summary": "SUSE Bug 1255157 for CVE-2025-68241",
"url": "https://bugzilla.suse.com/1255157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68241"
},
{
"cve": "CVE-2025-68245",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68245"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: netpoll: fix incorrect refcount handling causing incorrect cleanup\n\ncommit efa95b01da18 (\"netpoll: fix use after free\") incorrectly\nignored the refcount and prematurely set dev-\u003enpinfo to NULL during\nnetpoll cleanup, leading to improper behavior and memory leaks.\n\nScenario causing lack of proper cleanup:\n\n1) A netpoll is associated with a NIC (e.g., eth0) and netdev-\u003enpinfo is\n allocated, and refcnt = 1\n - Keep in mind that npinfo is shared among all netpoll instances. In\n this case, there is just one.\n\n2) Another netpoll is also associated with the same NIC and\n npinfo-\u003erefcnt += 1.\n - Now dev-\u003enpinfo-\u003erefcnt = 2;\n - There is just one npinfo associated to the netdev.\n\n3) When the first netpolls goes to clean up:\n - The first cleanup succeeds and clears np-\u003edev-\u003enpinfo, ignoring\n refcnt.\n - It basically calls `RCU_INIT_POINTER(np-\u003edev-\u003enpinfo, NULL);`\n - Set dev-\u003enpinfo = NULL, without proper cleanup\n - No -\u003endo_netpoll_cleanup() is either called\n\n4) Now the second target tries to clean up\n - The second cleanup fails because np-\u003edev-\u003enpinfo is already NULL.\n * In this case, ops-\u003endo_netpoll_cleanup() was never called, and\n the skb pool is not cleaned as well (for the second netpoll\n instance)\n - This leaks npinfo and skbpool skbs, which is clearly reported by\n kmemleak.\n\nRevert commit efa95b01da18 (\"netpoll: fix use after free\") and adds\nclarifying comments emphasizing that npinfo cleanup should only happen\nonce the refcount reaches zero, ensuring stable and correct netpoll\nbehavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68245",
"url": "https://www.suse.com/security/cve/CVE-2025-68245"
},
{
"category": "external",
"summary": "SUSE Bug 1255268 for CVE-2025-68245",
"url": "https://bugzilla.suse.com/1255268"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68245"
},
{
"cve": "CVE-2025-68261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68261"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add i_data_sem protection in ext4_destroy_inline_data_nolock()\n\nFix a race between inline data destruction and block mapping.\n\nThe function ext4_destroy_inline_data_nolock() changes the inode data\nlayout by clearing EXT4_INODE_INLINE_DATA and setting EXT4_INODE_EXTENTS.\nAt the same time, another thread may execute ext4_map_blocks(), which\ntests EXT4_INODE_EXTENTS to decide whether to call ext4_ext_map_blocks()\nor ext4_ind_map_blocks().\n\nWithout i_data_sem protection, ext4_ind_map_blocks() may receive inode\nwith EXT4_INODE_EXTENTS flag and triggering assert.\n\nkernel BUG at fs/ext4/indirect.c:546!\nEXT4-fs (loop2): unmounting filesystem.\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:ext4_ind_map_blocks.cold+0x2b/0x5a fs/ext4/indirect.c:546\n\nCall Trace:\n \u003cTASK\u003e\n ext4_map_blocks+0xb9b/0x16f0 fs/ext4/inode.c:681\n _ext4_get_block+0x242/0x590 fs/ext4/inode.c:822\n ext4_block_write_begin+0x48b/0x12c0 fs/ext4/inode.c:1124\n ext4_write_begin+0x598/0xef0 fs/ext4/inode.c:1255\n ext4_da_write_begin+0x21e/0x9c0 fs/ext4/inode.c:3000\n generic_perform_write+0x259/0x5d0 mm/filemap.c:3846\n ext4_buffered_write_iter+0x15b/0x470 fs/ext4/file.c:285\n ext4_file_write_iter+0x8e0/0x17f0 fs/ext4/file.c:679\n call_write_iter include/linux/fs.h:2271 [inline]\n do_iter_readv_writev+0x212/0x3c0 fs/read_write.c:735\n do_iter_write+0x186/0x710 fs/read_write.c:861\n vfs_iter_write+0x70/0xa0 fs/read_write.c:902\n iter_file_splice_write+0x73b/0xc90 fs/splice.c:685\n do_splice_from fs/splice.c:763 [inline]\n direct_splice_actor+0x10f/0x170 fs/splice.c:950\n splice_direct_to_actor+0x33a/0xa10 fs/splice.c:896\n do_splice_direct+0x1a9/0x280 fs/splice.c:1002\n do_sendfile+0xb13/0x12c0 fs/read_write.c:1255\n __do_sys_sendfile64 fs/read_write.c:1323 [inline]\n __se_sys_sendfile64 fs/read_write.c:1309 [inline]\n __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68261",
"url": "https://www.suse.com/security/cve/CVE-2025-68261"
},
{
"category": "external",
"summary": "SUSE Bug 1255164 for CVE-2025-68261",
"url": "https://bugzilla.suse.com/1255164"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68261"
},
{
"cve": "CVE-2025-68264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68264"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: refresh inline data size before write operations\n\nThe cached ei-\u003ei_inline_size can become stale between the initial size\ncheck and when ext4_update_inline_data()/ext4_create_inline_data() use\nit. Although ext4_get_max_inline_size() reads the correct value at the\ntime of the check, concurrent xattr operations can modify i_inline_size\nbefore ext4_write_lock_xattr() is acquired.\n\nThis causes ext4_update_inline_data() and ext4_create_inline_data() to\nwork with stale capacity values, leading to a BUG_ON() crash in\next4_write_inline_data():\n\n kernel BUG at fs/ext4/inline.c:1331!\n BUG_ON(pos + len \u003e EXT4_I(inode)-\u003ei_inline_size);\n\nThe race window:\n1. ext4_get_max_inline_size() reads i_inline_size = 60 (correct)\n2. Size check passes for 50-byte write\n3. [Another thread adds xattr, i_inline_size changes to 40]\n4. ext4_write_lock_xattr() acquires lock\n5. ext4_update_inline_data() uses stale i_inline_size = 60\n6. Attempts to write 50 bytes but only 40 bytes actually available\n7. BUG_ON() triggers\n\nFix this by recalculating i_inline_size via ext4_find_inline_data_nolock()\nimmediately after acquiring xattr_sem. This ensures ext4_update_inline_data()\nand ext4_create_inline_data() work with current values that are protected\nfrom concurrent modifications.\n\nThis is similar to commit a54c4613dac1 (\"ext4: fix race writing to an\ninline_data file while its xattrs are changing\") which fixed i_inline_off\nstaleness. This patch addresses the related i_inline_size staleness issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68264",
"url": "https://www.suse.com/security/cve/CVE-2025-68264"
},
{
"category": "external",
"summary": "SUSE Bug 1255380 for CVE-2025-68264",
"url": "https://bugzilla.suse.com/1255380"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68264"
},
{
"cve": "CVE-2025-68286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68286"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check NULL before accessing\n\n[WHAT]\nIGT kms_cursor_legacy\u0027s long-nonblocking-modeset-vs-cursor-atomic\nfails with NULL pointer dereference. This can be reproduced with\nboth an eDP panel and a DP monitors connected.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: Oops: 0000 [#1] SMP NOPTI\n CPU: 13 UID: 0 PID: 2960 Comm: kms_cursor_lega Not tainted\n6.16.0-99-custom #8 PREEMPT(voluntary)\n Hardware name: AMD ........\n RIP: 0010:dc_stream_get_scanoutpos+0x34/0x130 [amdgpu]\n Code: 57 4d 89 c7 41 56 49 89 ce 41 55 49 89 d5 41 54 49\n 89 fc 53 48 83 ec 18 48 8b 87 a0 64 00 00 48 89 75 d0 48 c7 c6 e0 41 30\n c2 \u003c48\u003e 8b 38 48 8b 9f 68 06 00 00 e8 8d d7 fd ff 31 c0 48 81 c3 e0 02\n RSP: 0018:ffffd0f3c2bd7608 EFLAGS: 00010292\n RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffd0f3c2bd7668\n RDX: ffffd0f3c2bd7664 RSI: ffffffffc23041e0 RDI: ffff8b32494b8000\n RBP: ffffd0f3c2bd7648 R08: ffffd0f3c2bd766c R09: ffffd0f3c2bd7760\n R10: ffffd0f3c2bd7820 R11: 0000000000000000 R12: ffff8b32494b8000\n R13: ffffd0f3c2bd7664 R14: ffffd0f3c2bd7668 R15: ffffd0f3c2bd766c\n FS: 000071f631b68700(0000) GS:ffff8b399f114000(0000)\nknlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 00000001b8105000 CR4: 0000000000f50ef0\n PKRU: 55555554\n Call Trace:\n \u003cTASK\u003e\n dm_crtc_get_scanoutpos+0xd7/0x180 [amdgpu]\n amdgpu_display_get_crtc_scanoutpos+0x86/0x1c0 [amdgpu]\n ? __pfx_amdgpu_crtc_get_scanout_position+0x10/0x10[amdgpu]\n amdgpu_crtc_get_scanout_position+0x27/0x50 [amdgpu]\n drm_crtc_vblank_helper_get_vblank_timestamp_internal+0xf7/0x400\n drm_crtc_vblank_helper_get_vblank_timestamp+0x1c/0x30\n drm_crtc_get_last_vbltimestamp+0x55/0x90\n drm_crtc_next_vblank_start+0x45/0xa0\n drm_atomic_helper_wait_for_fences+0x81/0x1f0\n ...\n\n(cherry picked from commit 621e55f1919640acab25383362b96e65f2baea3c)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68286",
"url": "https://www.suse.com/security/cve/CVE-2025-68286"
},
{
"category": "external",
"summary": "SUSE Bug 1255351 for CVE-2025-68286",
"url": "https://bugzilla.suse.com/1255351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68286"
},
{
"cve": "CVE-2025-68296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68296"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup\n\nProtect vga_switcheroo_client_fb_set() with console lock. Avoids OOB\naccess in fbcon_remap_all(). Without holding the console lock the call\nraces with switching outputs.\n\nVGA switcheroo calls fbcon_remap_all() when switching clients. The fbcon\nfunction uses struct fb_info.node, which is set by register_framebuffer().\nAs the fb-helper code currently sets up VGA switcheroo before registering\nthe framebuffer, the value of node is -1 and therefore not a legal value.\nFor example, fbcon uses the value within set_con2fb_map() [1] as an index\ninto an array.\n\nMoving vga_switcheroo_client_fb_set() after register_framebuffer() can\nresult in VGA switching that does not switch fbcon correctly.\n\nTherefore move vga_switcheroo_client_fb_set() under fbcon_fb_registered(),\nwhich already holds the console lock. Fbdev calls fbcon_fb_registered()\nfrom within register_framebuffer(). Serializes the helper with VGA\nswitcheroo\u0027s call to fbcon_remap_all().\n\nAlthough vga_switcheroo_client_fb_set() takes an instance of struct fb_info\nas parameter, it really only needs the contained fbcon state. Moving the\ncall to fbcon initialization is therefore cleaner than before. Only amdgpu,\ni915, nouveau and radeon support vga_switcheroo. For all other drivers,\nthis change does nothing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68296",
"url": "https://www.suse.com/security/cve/CVE-2025-68296"
},
{
"category": "external",
"summary": "SUSE Bug 1255128 for CVE-2025-68296",
"url": "https://bugzilla.suse.com/1255128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68296"
},
{
"cve": "CVE-2025-68303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68303"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: intel: punit_ipc: fix memory corruption\n\nThis passes the address of the pointer \"\u0026punit_ipcdev\" when the intent\nwas to pass the pointer itself \"punit_ipcdev\" (without the ampersand).\nThis means that the:\n\n\tcomplete(\u0026ipcdev-\u003ecmd_complete);\n\nin intel_punit_ioc() will write to a wrong memory address corrupting it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68303",
"url": "https://www.suse.com/security/cve/CVE-2025-68303"
},
{
"category": "external",
"summary": "SUSE Bug 1255122 for CVE-2025-68303",
"url": "https://bugzilla.suse.com/1255122"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68303"
},
{
"cve": "CVE-2025-68305",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68305"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_sock: Prevent race in socket write iter and sock bind\n\nThere is a potential race condition between sock bind and socket write\niter. bind may free the same cmd via mgmt_pending before write iter sends\nthe cmd, just as syzbot reported in UAF[1].\n\nHere we use hci_dev_lock to synchronize the two, thereby avoiding the\nUAF mentioned in [1].\n\n[1]\nsyzbot reported:\nBUG: KASAN: slab-use-after-free in mgmt_pending_remove+0x3b/0x210 net/bluetooth/mgmt_util.c:316\nRead of size 8 at addr ffff888077164818 by task syz.0.17/5989\nCall Trace:\n mgmt_pending_remove+0x3b/0x210 net/bluetooth/mgmt_util.c:316\n set_link_security+0x5c2/0x710 net/bluetooth/mgmt.c:1918\n hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719\n hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839\n sock_sendmsg_nosec net/socket.c:727 [inline]\n __sock_sendmsg+0x21c/0x270 net/socket.c:742\n sock_write_iter+0x279/0x360 net/socket.c:1195\n\nAllocated by task 5989:\n mgmt_pending_add+0x35/0x140 net/bluetooth/mgmt_util.c:296\n set_link_security+0x557/0x710 net/bluetooth/mgmt.c:1910\n hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719\n hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839\n sock_sendmsg_nosec net/socket.c:727 [inline]\n __sock_sendmsg+0x21c/0x270 net/socket.c:742\n sock_write_iter+0x279/0x360 net/socket.c:1195\n\nFreed by task 5991:\n mgmt_pending_free net/bluetooth/mgmt_util.c:311 [inline]\n mgmt_pending_foreach+0x30d/0x380 net/bluetooth/mgmt_util.c:257\n mgmt_index_removed+0x112/0x2f0 net/bluetooth/mgmt.c:9477\n hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68305",
"url": "https://www.suse.com/security/cve/CVE-2025-68305"
},
{
"category": "external",
"summary": "SUSE Bug 1255169 for CVE-2025-68305",
"url": "https://bugzilla.suse.com/1255169"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68305"
},
{
"cve": "CVE-2025-68312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68312"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Prevents free active kevent\n\nThe root cause of this issue are:\n1. When probing the usbnet device, executing usbnet_link_change(dev, 0, 0);\nput the kevent work in global workqueue. However, the kevent has not yet\nbeen scheduled when the usbnet device is unregistered. Therefore, executing\nfree_netdev() results in the \"free active object (kevent)\" error reported\nhere.\n\n2. Another factor is that when calling usbnet_disconnect()-\u003eunregister_netdev(),\nif the usbnet device is up, ndo_stop() is executed to cancel the kevent.\nHowever, because the device is not up, ndo_stop() is not executed.\n\nThe solution to this problem is to cancel the kevent before executing\nfree_netdev().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68312",
"url": "https://www.suse.com/security/cve/CVE-2025-68312"
},
{
"category": "external",
"summary": "SUSE Bug 1255171 for CVE-2025-68312",
"url": "https://bugzilla.suse.com/1255171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68312"
},
{
"cve": "CVE-2025-68337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68337"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted\n\nThere\u0027s issue when file system corrupted:\n------------[ cut here ]------------\nkernel BUG at fs/jbd2/transaction.c:1289!\nOops: invalid opcode: 0000 [#1] SMP KASAN PTI\nCPU: 5 UID: 0 PID: 2031 Comm: mkdir Not tainted 6.18.0-rc1-next\nRIP: 0010:jbd2_journal_get_create_access+0x3b6/0x4d0\nRSP: 0018:ffff888117aafa30 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: ffff88811a86b000 RCX: ffffffff89a63534\nRDX: 1ffff110200ec602 RSI: 0000000000000004 RDI: ffff888100763010\nRBP: ffff888100763000 R08: 0000000000000001 R09: ffff888100763028\nR10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000000\nR13: ffff88812c432000 R14: ffff88812c608000 R15: ffff888120bfc000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f91d6970c99 CR3: 00000001159c4000 CR4: 00000000000006f0\nCall Trace:\n \u003cTASK\u003e\n __ext4_journal_get_create_access+0x42/0x170\n ext4_getblk+0x319/0x6f0\n ext4_bread+0x11/0x100\n ext4_append+0x1e6/0x4a0\n ext4_init_new_dir+0x145/0x1d0\n ext4_mkdir+0x326/0x920\n vfs_mkdir+0x45c/0x740\n do_mkdirat+0x234/0x2f0\n __x64_sys_mkdir+0xd6/0x120\n do_syscall_64+0x5f/0xfa0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe above issue occurs with us in errors=continue mode when accompanied by\nstorage failures. There have been many inconsistencies in the file system\ndata.\nIn the case of file system data inconsistency, for example, if the block\nbitmap of a referenced block is not set, it can lead to the situation where\na block being committed is allocated and used again. As a result, the\nfollowing condition will not be satisfied then trigger BUG_ON. Of course,\nit is entirely possible to construct a problematic image that can trigger\nthis BUG_ON through specific operations. In fact, I have constructed such\nan image and easily reproduced this issue.\nTherefore, J_ASSERT() holds true only under ideal conditions, but it may\nnot necessarily be satisfied in exceptional scenarios. Using J_ASSERT()\ndirectly in abnormal situations would cause the system to crash, which is\nclearly not what we want. So here we directly trigger a JBD abort instead\nof immediately invoking BUG_ON.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68337",
"url": "https://www.suse.com/security/cve/CVE-2025-68337"
},
{
"category": "external",
"summary": "SUSE Bug 1255482 for CVE-2025-68337",
"url": "https://bugzilla.suse.com/1255482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68337"
},
{
"cve": "CVE-2025-68349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68349"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid\n\nFixes a crash when layout is null during this call stack:\n\nwrite_inode\n -\u003e nfs4_write_inode\n -\u003e pnfs_layoutcommit_inode\n\npnfs_set_layoutcommit relies on the lseg refcount to keep the layout\naround. Need to clear NFS_INO_LAYOUTCOMMIT otherwise we might attempt\nto reference a null layout.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68349",
"url": "https://www.suse.com/security/cve/CVE-2025-68349"
},
{
"category": "external",
"summary": "SUSE Bug 1255544 for CVE-2025-68349",
"url": "https://bugzilla.suse.com/1255544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68349"
},
{
"cve": "CVE-2025-68354",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68354"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: core: Protect regulator_supply_alias_list with regulator_list_mutex\n\nregulator_supply_alias_list was accessed without any locking in\nregulator_supply_alias(), regulator_register_supply_alias(), and\nregulator_unregister_supply_alias(). Concurrent registration,\nunregistration and lookups can race, leading to:\n\n1 use-after-free if an alias entry is removed while being read,\n2 duplicate entries when two threads register the same alias,\n3 inconsistent alias mappings observed by consumers.\n\nProtect all traversals, insertions and deletions on\nregulator_supply_alias_list with the existing regulator_list_mutex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68354",
"url": "https://www.suse.com/security/cve/CVE-2025-68354"
},
{
"category": "external",
"summary": "SUSE Bug 1255553 for CVE-2025-68354",
"url": "https://bugzilla.suse.com/1255553"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68354"
},
{
"cve": "CVE-2025-68362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68362"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()\n\nThe rtl8187_rx_cb() calculates the rx descriptor header address\nby subtracting its size from the skb tail pointer.\nHowever, it does not validate if the received packet\n(skb-\u003elen from urb-\u003eactual_length) is large enough to contain this\nheader.\n\nIf a truncated packet is received, this will lead to a buffer\nunderflow, reading memory before the start of the skb data area,\nand causing a kernel panic.\n\nAdd length checks for both rtl8187 and rtl8187b descriptor headers\nbefore attempting to access them, dropping the packet cleanly if the\ncheck fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68362",
"url": "https://www.suse.com/security/cve/CVE-2025-68362"
},
{
"category": "external",
"summary": "SUSE Bug 1255611 for CVE-2025-68362",
"url": "https://bugzilla.suse.com/1255611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68362"
},
{
"cve": "CVE-2025-68366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68366"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: defer config unlock in nbd_genl_connect\n\nThere is one use-after-free warning when running NBD_CMD_CONNECT and\nNBD_CLEAR_SOCK:\n\nnbd_genl_connect\n nbd_alloc_and_init_config // config_refs=1\n nbd_start_device // config_refs=2\n set NBD_RT_HAS_CONFIG_REF\t\t\topen nbd // config_refs=3\n recv_work done // config_refs=2\n\t\t\t\t\t\tNBD_CLEAR_SOCK // config_refs=1\n\t\t\t\t\t\tclose nbd // config_refs=0\n refcount_inc -\u003e uaf\n\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 24 PID: 1014 at lib/refcount.c:25 refcount_warn_saturate+0x12e/0x290\n nbd_genl_connect+0x16d0/0x1ab0\n genl_family_rcv_msg_doit+0x1f3/0x310\n genl_rcv_msg+0x44a/0x790\n\nThe issue can be easily reproduced by adding a small delay before\nrefcount_inc(\u0026nbd-\u003econfig_refs) in nbd_genl_connect():\n\n mutex_unlock(\u0026nbd-\u003econfig_lock);\n if (!ret) {\n set_bit(NBD_RT_HAS_CONFIG_REF, \u0026config-\u003eruntime_flags);\n+ printk(\"before sleep\\n\");\n+ mdelay(5 * 1000);\n+ printk(\"after sleep\\n\");\n refcount_inc(\u0026nbd-\u003econfig_refs);\n nbd_connect_reply(info, nbd-\u003eindex);\n }",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68366",
"url": "https://www.suse.com/security/cve/CVE-2025-68366"
},
{
"category": "external",
"summary": "SUSE Bug 1255622 for CVE-2025-68366",
"url": "https://bugzilla.suse.com/1255622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68366"
},
{
"cve": "CVE-2025-68367",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68367"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse\n\nThe following warning appears when running syzkaller, and this issue also\nexists in the mainline code.\n\n ------------[ cut here ]------------\n list_add double add: new=ffffffffa57eee28, prev=ffffffffa57eee28, next=ffffffffa5e63100.\n WARNING: CPU: 0 PID: 1491 at lib/list_debug.c:35 __list_add_valid_or_report+0xf7/0x130\n Modules linked in:\n CPU: 0 PID: 1491 Comm: syz.1.28 Not tainted 6.6.0+ #3\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n RIP: 0010:__list_add_valid_or_report+0xf7/0x130\n RSP: 0018:ff1100010dfb7b78 EFLAGS: 00010282\n RAX: 0000000000000000 RBX: ffffffffa57eee18 RCX: ffffffff97fc9817\n RDX: 0000000000040000 RSI: ffa0000002383000 RDI: 0000000000000001\n RBP: ffffffffa57eee28 R08: 0000000000000001 R09: ffe21c0021bf6f2c\n R10: 0000000000000001 R11: 6464615f7473696c R12: ffffffffa5e63100\n R13: ffffffffa57eee28 R14: ffffffffa57eee28 R15: ff1100010dfb7d48\n FS: 00007fb14398b640(0000) GS:ff11000119600000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 000000010d096005 CR4: 0000000000773ef0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 80000000\n Call Trace:\n \u003cTASK\u003e\n input_register_handler+0xb3/0x210\n mac_hid_start_emulation+0x1c5/0x290\n mac_hid_toggle_emumouse+0x20a/0x240\n proc_sys_call_handler+0x4c2/0x6e0\n new_sync_write+0x1b1/0x2d0\n vfs_write+0x709/0x950\n ksys_write+0x12a/0x250\n do_syscall_64+0x5a/0x110\n entry_SYSCALL_64_after_hwframe+0x78/0xe2\n\nThe WARNING occurs when two processes concurrently write to the mac-hid\nemulation sysctl, causing a race condition in mac_hid_toggle_emumouse().\nBoth processes read old_val=0, then both try to register the input handler,\nleading to a double list_add of the same handler.\n\n CPU0 CPU1\n ------------------------- -------------------------\n vfs_write() //write 1 vfs_write() //write 1\n proc_sys_write() proc_sys_write()\n mac_hid_toggle_emumouse() mac_hid_toggle_emumouse()\n old_val = *valp // old_val=0\n old_val = *valp // old_val=0\n mutex_lock_killable()\n proc_dointvec() // *valp=1\n mac_hid_start_emulation()\n input_register_handler()\n mutex_unlock()\n mutex_lock_killable()\n proc_dointvec()\n mac_hid_start_emulation()\n input_register_handler() //Trigger Warning\n mutex_unlock()\n\nFix this by moving the old_val read inside the mutex lock region.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68367",
"url": "https://www.suse.com/security/cve/CVE-2025-68367"
},
{
"category": "external",
"summary": "SUSE Bug 1255547 for CVE-2025-68367",
"url": "https://bugzilla.suse.com/1255547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68367"
},
{
"cve": "CVE-2025-68372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68372"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: defer config put in recv_work\n\nThere is one uaf issue in recv_work when running NBD_CLEAR_SOCK and\nNBD_CMD_RECONFIGURE:\n nbd_genl_connect // conf_ref=2 (connect and recv_work A)\n nbd_open\t // conf_ref=3\n recv_work A done // conf_ref=2\n NBD_CLEAR_SOCK // conf_ref=1\n nbd_genl_reconfigure // conf_ref=2 (trigger recv_work B)\n close nbd\t // conf_ref=1\n recv_work B\n config_put // conf_ref=0\n atomic_dec(\u0026config-\u003erecv_threads); -\u003e UAF\n\nOr only running NBD_CLEAR_SOCK:\n nbd_genl_connect // conf_ref=2\n nbd_open \t // conf_ref=3\n NBD_CLEAR_SOCK // conf_ref=2\n close nbd\n nbd_release\n config_put // conf_ref=1\n recv_work\n config_put \t // conf_ref=0\n atomic_dec(\u0026config-\u003erecv_threads); -\u003e UAF\n\nCommit 87aac3a80af5 (\"nbd: call nbd_config_put() before notifying the\nwaiter\") moved nbd_config_put() to run before waking up the waiter in\nrecv_work, in order to ensure that nbd_start_device_ioctl() would not\nbe woken up while nbd-\u003etask_recv was still uncleared.\n\nHowever, in nbd_start_device_ioctl(), after being woken up it explicitly\ncalls flush_workqueue() to make sure all current works are finished.\nTherefore, there is no need to move the config put ahead of the wakeup.\n\nMove nbd_config_put() to the end of recv_work, so that the reference is\nheld for the whole lifetime of the worker thread. This makes sure the\nconfig cannot be freed while recv_work is still running, even if clear\n+ reconfigure interleave.\n\nIn addition, we don\u0027t need to worry about recv_work dropping the last\nnbd_put (which causes deadlock):\n\npath A (netlink with NBD_CFLAG_DESTROY_ON_DISCONNECT):\n connect // nbd_refs=1 (trigger recv_work)\n open nbd // nbd_refs=2\n NBD_CLEAR_SOCK\n close nbd\n nbd_release\n nbd_disconnect_and_put\n flush_workqueue // recv_work done\n nbd_config_put\n nbd_put // nbd_refs=1\n nbd_put // nbd_refs=0\n queue_work\n\npath B (netlink without NBD_CFLAG_DESTROY_ON_DISCONNECT):\n connect // nbd_refs=2 (trigger recv_work)\n open nbd // nbd_refs=3\n NBD_CLEAR_SOCK // conf_refs=2\n close nbd\n nbd_release\n nbd_config_put // conf_refs=1\n nbd_put // nbd_refs=2\n recv_work done // conf_refs=0, nbd_refs=1\n rmmod // nbd_refs=0\n\nDepends-on: e2daec488c57 (\"nbd: Fix hungtask when nbd_config_put\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68372",
"url": "https://www.suse.com/security/cve/CVE-2025-68372"
},
{
"category": "external",
"summary": "SUSE Bug 1255537 for CVE-2025-68372",
"url": "https://bugzilla.suse.com/1255537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68372"
},
{
"cve": "CVE-2025-68379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix null deref on srq-\u003erq.queue after resize failure\n\nA NULL pointer dereference can occur in rxe_srq_chk_attr() when\nibv_modify_srq() is invoked twice in succession under certain error\nconditions. The first call may fail in rxe_queue_resize(), which leads\nrxe_srq_from_attr() to set srq-\u003erq.queue = NULL. The second call then\ntriggers a crash (null deref) when accessing\nsrq-\u003erq.queue-\u003ebuf-\u003eindex_mask.\n\nCall Trace:\n\u003cTASK\u003e\nrxe_modify_srq+0x170/0x480 [rdma_rxe]\n? __pfx_rxe_modify_srq+0x10/0x10 [rdma_rxe]\n? uverbs_try_lock_object+0x4f/0xa0 [ib_uverbs]\n? rdma_lookup_get_uobject+0x1f0/0x380 [ib_uverbs]\nib_uverbs_modify_srq+0x204/0x290 [ib_uverbs]\n? __pfx_ib_uverbs_modify_srq+0x10/0x10 [ib_uverbs]\n? tryinc_node_nr_active+0xe6/0x150\n? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]\nib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x2c0/0x470 [ib_uverbs]\n? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]\n? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]\nib_uverbs_run_method+0x55a/0x6e0 [ib_uverbs]\n? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]\nib_uverbs_cmd_verbs+0x54d/0x800 [ib_uverbs]\n? __pfx_ib_uverbs_cmd_verbs+0x10/0x10 [ib_uverbs]\n? __pfx___raw_spin_lock_irqsave+0x10/0x10\n? __pfx_do_vfs_ioctl+0x10/0x10\n? ioctl_has_perm.constprop.0.isra.0+0x2c7/0x4c0\n? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10\nib_uverbs_ioctl+0x13e/0x220 [ib_uverbs]\n? __pfx_ib_uverbs_ioctl+0x10/0x10 [ib_uverbs]\n__x64_sys_ioctl+0x138/0x1c0\ndo_syscall_64+0x82/0x250\n? fdget_pos+0x58/0x4c0\n? ksys_write+0xf3/0x1c0\n? __pfx_ksys_write+0x10/0x10\n? do_syscall_64+0xc8/0x250\n? __pfx_vm_mmap_pgoff+0x10/0x10\n? fget+0x173/0x230\n? fput+0x2a/0x80\n? ksys_mmap_pgoff+0x224/0x4c0\n? do_syscall_64+0xc8/0x250\n? do_user_addr_fault+0x37b/0xfe0\n? clear_bhb_loop+0x50/0xa0\n? clear_bhb_loop+0x50/0xa0\n? clear_bhb_loop+0x50/0xa0\nentry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68379",
"url": "https://www.suse.com/security/cve/CVE-2025-68379"
},
{
"category": "external",
"summary": "SUSE Bug 1255695 for CVE-2025-68379",
"url": "https://bugzilla.suse.com/1255695"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68379"
},
{
"cve": "CVE-2025-68740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68740"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nima: Handle error code returned by ima_filter_rule_match()\n\nIn ima_match_rules(), if ima_filter_rule_match() returns -ENOENT due to\nthe rule being NULL, the function incorrectly skips the \u0027if (!rc)\u0027 check\nand sets \u0027result = true\u0027. The LSM rule is considered a match, causing\nextra files to be measured by IMA.\n\nThis issue can be reproduced in the following scenario:\nAfter unloading the SELinux policy module via \u0027semodule -d\u0027, if an IMA\nmeasurement is triggered before ima_lsm_rules is updated,\nin ima_match_rules(), the first call to ima_filter_rule_match() returns\n-ESTALE. This causes the code to enter the \u0027if (rc == -ESTALE \u0026\u0026\n!rule_reinitialized)\u0027 block, perform ima_lsm_copy_rule() and retry. In\nima_lsm_copy_rule(), since the SELinux module has been removed, the rule\nbecomes NULL, and the second call to ima_filter_rule_match() returns\n-ENOENT. This bypasses the \u0027if (!rc)\u0027 check and results in a false match.\n\nCall trace:\n selinux_audit_rule_match+0x310/0x3b8\n security_audit_rule_match+0x60/0xa0\n ima_match_rules+0x2e4/0x4a0\n ima_match_policy+0x9c/0x1e8\n ima_get_action+0x48/0x60\n process_measurement+0xf8/0xa98\n ima_bprm_check+0x98/0xd8\n security_bprm_check+0x5c/0x78\n search_binary_handler+0x6c/0x318\n exec_binprm+0x58/0x1b8\n bprm_execve+0xb8/0x130\n do_execveat_common.isra.0+0x1a8/0x258\n __arm64_sys_execve+0x48/0x68\n invoke_syscall+0x50/0x128\n el0_svc_common.constprop.0+0xc8/0xf0\n do_el0_svc+0x24/0x38\n el0_svc+0x44/0x200\n el0t_64_sync_handler+0x100/0x130\n el0t_64_sync+0x3c8/0x3d0\n\nFix this by changing \u0027if (!rc)\u0027 to \u0027if (rc \u003c= 0)\u0027 to ensure that error\ncodes like -ENOENT do not bypass the check and accidentally result in a\nsuccessful match.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68740",
"url": "https://www.suse.com/security/cve/CVE-2025-68740"
},
{
"category": "external",
"summary": "SUSE Bug 1255812 for CVE-2025-68740",
"url": "https://bugzilla.suse.com/1255812"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68740"
},
{
"cve": "CVE-2025-68757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68757"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vgem-fence: Fix potential deadlock on release\n\nA timer that expires a vgem fence automatically in 10 seconds is now\nreleased with timer_delete_sync() from fence-\u003eops.release() called on last\ndma_fence_put(). In some scenarios, it can run in IRQ context, which is\nnot safe unless TIMER_IRQSAFE is used. One potentially risky scenario was\ndemonstrated in Intel DRM CI trybot, BAT run on machine bat-adlp-6, while\nworking on new IGT subtests syncobj_timeline@stress-* as user space\nreplacements of some problematic test cases of a dma-fence-chain selftest\n[1].\n\n[117.004338] ================================\n[117.004340] WARNING: inconsistent lock state\n[117.004342] 6.17.0-rc7-CI_DRM_17270-g7644974e648c+ #1 Tainted: G S U\n[117.004346] --------------------------------\n[117.004347] inconsistent {HARDIRQ-ON-W} -\u003e {IN-HARDIRQ-W} usage.\n[117.004349] swapper/0/0 [HC1[1]:SC1[1]:HE0:SE0] takes:\n[117.004352] ffff888138f86aa8 ((\u0026fence-\u003etimer)){?.-.}-{0:0}, at: __timer_delete_sync+0x4b/0x190\n[117.004361] {HARDIRQ-ON-W} state was registered at:\n[117.004363] lock_acquire+0xc4/0x2e0\n[117.004366] call_timer_fn+0x80/0x2a0\n[117.004368] __run_timers+0x231/0x310\n[117.004370] run_timer_softirq+0x76/0xe0\n[117.004372] handle_softirqs+0xd4/0x4d0\n[117.004375] __irq_exit_rcu+0x13f/0x160\n[117.004377] irq_exit_rcu+0xe/0x20\n[117.004379] sysvec_apic_timer_interrupt+0xa0/0xc0\n[117.004382] asm_sysvec_apic_timer_interrupt+0x1b/0x20\n[117.004385] cpuidle_enter_state+0x12b/0x8a0\n[117.004388] cpuidle_enter+0x2e/0x50\n[117.004393] call_cpuidle+0x22/0x60\n[117.004395] do_idle+0x1fd/0x260\n[117.004398] cpu_startup_entry+0x29/0x30\n[117.004401] start_secondary+0x12d/0x160\n[117.004404] common_startup_64+0x13e/0x141\n[117.004407] irq event stamp: 2282669\n[117.004409] hardirqs last enabled at (2282668): [\u003cffffffff8289db71\u003e] _raw_spin_unlock_irqrestore+0x51/0x80\n[117.004414] hardirqs last disabled at (2282669): [\u003cffffffff82882021\u003e] sysvec_irq_work+0x11/0xc0\n[117.004419] softirqs last enabled at (2254702): [\u003cffffffff8289fd00\u003e] __do_softirq+0x10/0x18\n[117.004423] softirqs last disabled at (2254725): [\u003cffffffff813d4ddf\u003e] __irq_exit_rcu+0x13f/0x160\n[117.004426]\nother info that might help us debug this:\n[117.004429] Possible unsafe locking scenario:\n[117.004432] CPU0\n[117.004433] ----\n[117.004434] lock((\u0026fence-\u003etimer));\n[117.004436] \u003cInterrupt\u003e\n[117.004438] lock((\u0026fence-\u003etimer));\n[117.004440]\n *** DEADLOCK ***\n[117.004443] 1 lock held by swapper/0/0:\n[117.004445] #0: ffffc90000003d50 ((\u0026fence-\u003etimer)){?.-.}-{0:0}, at: call_timer_fn+0x7a/0x2a0\n[117.004450]\nstack backtrace:\n[117.004453] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G S U 6.17.0-rc7-CI_DRM_17270-g7644974e648c+ #1 PREEMPT(voluntary)\n[117.004455] Tainted: [S]=CPU_OUT_OF_SPEC, [U]=USER\n[117.004455] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023\n[117.004456] Call Trace:\n[117.004456] \u003cIRQ\u003e\n[117.004457] dump_stack_lvl+0x91/0xf0\n[117.004460] dump_stack+0x10/0x20\n[117.004461] print_usage_bug.part.0+0x260/0x360\n[117.004463] mark_lock+0x76e/0x9c0\n[117.004465] ? register_lock_class+0x48/0x4a0\n[117.004467] __lock_acquire+0xbc3/0x2860\n[117.004469] lock_acquire+0xc4/0x2e0\n[117.004470] ? __timer_delete_sync+0x4b/0x190\n[117.004472] ? __timer_delete_sync+0x4b/0x190\n[117.004473] __timer_delete_sync+0x68/0x190\n[117.004474] ? __timer_delete_sync+0x4b/0x190\n[117.004475] timer_delete_sync+0x10/0x20\n[117.004476] vgem_fence_release+0x19/0x30 [vgem]\n[117.004478] dma_fence_release+0xc1/0x3b0\n[117.004480] ? dma_fence_release+0xa1/0x3b0\n[117.004481] dma_fence_chain_release+0xe7/0x130\n[117.004483] dma_fence_release+0xc1/0x3b0\n[117.004484] ? _raw_spin_unlock_irqrestore+0x27/0x80\n[117.004485] dma_fence_chain_irq_work+0x59/0x80\n[117.004487] irq_work_single+0x75/0xa0\n[117.004490] irq_work_r\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68757",
"url": "https://www.suse.com/security/cve/CVE-2025-68757"
},
{
"category": "external",
"summary": "SUSE Bug 1255943 for CVE-2025-68757",
"url": "https://bugzilla.suse.com/1255943"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68757"
},
{
"cve": "CVE-2025-68767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68767"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: Verify inode mode when loading from disk\n\nsyzbot is reporting that S_IFMT bits of inode-\u003ei_mode can become bogus when\nthe S_IFMT bits of the 16bits \"mode\" field loaded from disk are corrupted.\n\nAccording to [1], the permissions field was treated as reserved in Mac OS\n8 and 9. According to [2], the reserved field was explicitly initialized\nwith 0, and that field must remain 0 as long as reserved. Therefore, when\nthe \"mode\" field is not 0 (i.e. no longer reserved), the file must be\nS_IFDIR if dir == 1, and the file must be one of S_IFREG/S_IFLNK/S_IFCHR/\nS_IFBLK/S_IFIFO/S_IFSOCK if dir == 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68767",
"url": "https://www.suse.com/security/cve/CVE-2025-68767"
},
{
"category": "external",
"summary": "SUSE Bug 1256580 for CVE-2025-68767",
"url": "https://bugzilla.suse.com/1256580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68767"
},
{
"cve": "CVE-2025-68771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68771"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix kernel BUG in ocfs2_find_victim_chain\n\nsyzbot reported a kernel BUG in ocfs2_find_victim_chain() because the\n`cl_next_free_rec` field of the allocation chain list (next free slot in\nthe chain list) is 0, triggring the BUG_ON(!cl-\u003ecl_next_free_rec)\ncondition in ocfs2_find_victim_chain() and panicking the kernel.\n\nTo fix this, an if condition is introduced in ocfs2_claim_suballoc_bits(),\njust before calling ocfs2_find_victim_chain(), the code block in it being\nexecuted when either of the following conditions is true:\n\n1. `cl_next_free_rec` is equal to 0, indicating that there are no free\nchains in the allocation chain list\n2. `cl_next_free_rec` is greater than `cl_count` (the total number of\nchains in the allocation chain list)\n\nEither of them being true is indicative of the fact that there are no\nchains left for usage.\n\nThis is addressed using ocfs2_error(), which prints\nthe error log for debugging purposes, rather than panicking the kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68771",
"url": "https://www.suse.com/security/cve/CVE-2025-68771"
},
{
"category": "external",
"summary": "SUSE Bug 1256582 for CVE-2025-68771",
"url": "https://bugzilla.suse.com/1256582"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68771"
},
{
"cve": "CVE-2025-68774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68774"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create\n\nWhen sync() and link() are called concurrently, both threads may\nenter hfs_bnode_find() without finding the node in the hash table\nand proceed to create it.\n\nThread A:\n hfsplus_write_inode()\n -\u003e hfsplus_write_system_inode()\n -\u003e hfs_btree_write()\n -\u003e hfs_bnode_find(tree, 0)\n -\u003e __hfs_bnode_create(tree, 0)\n\nThread B:\n hfsplus_create_cat()\n -\u003e hfs_brec_insert()\n -\u003e hfs_bnode_split()\n -\u003e hfs_bmap_alloc()\n -\u003e hfs_bnode_find(tree, 0)\n -\u003e __hfs_bnode_create(tree, 0)\n\nIn this case, thread A creates the bnode, sets refcnt=1, and hashes it.\nThread B also tries to create the same bnode, notices it has already\nbeen inserted, drops its own instance, and uses the hashed one without\ngetting the node.\n\n```\n\n\tnode2 = hfs_bnode_findhash(tree, cnid);\n\tif (!node2) { \u003c- Thread A\n\t\thash = hfs_bnode_hash(cnid);\n\t\tnode-\u003enext_hash = tree-\u003enode_hash[hash];\n\t\ttree-\u003enode_hash[hash] = node;\n\t\ttree-\u003enode_hash_cnt++;\n\t} else { \u003c- Thread B\n\t\tspin_unlock(\u0026tree-\u003ehash_lock);\n\t\tkfree(node);\n\t\twait_event(node2-\u003elock_wq,\n\t\t\t!test_bit(HFS_BNODE_NEW, \u0026node2-\u003eflags));\n\t\treturn node2;\n\t}\n```\n\nHowever, hfs_bnode_find() requires each call to take a reference.\nHere both threads end up setting refcnt=1. When they later put the node,\nthis triggers:\n\nBUG_ON(!atomic_read(\u0026node-\u003erefcnt))\n\nIn this scenario, Thread B in fact finds the node in the hash table\nrather than creating a new one, and thus must take a reference.\n\nFix this by calling hfs_bnode_get() when reusing a bnode newly created by\nanother thread to ensure the refcount is updated correctly.\n\nA similar bug was fixed in HFS long ago in commit\na9dc087fd3c4 (\"fix missing hfs_bnode_get() in __hfs_bnode_create\")\nbut the same issue remained in HFS+ until now.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68774",
"url": "https://www.suse.com/security/cve/CVE-2025-68774"
},
{
"category": "external",
"summary": "SUSE Bug 1256585 for CVE-2025-68774",
"url": "https://bugzilla.suse.com/1256585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68774"
},
{
"cve": "CVE-2025-68783",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68783"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-mixer: us16x08: validate meter packet indices\n\nget_meter_levels_from_urb() parses the 64-byte meter packets sent by\nthe device and fills the per-channel arrays meter_level[],\ncomp_level[] and master_level[] in struct snd_us16x08_meter_store.\n\nCurrently the function derives the channel index directly from the\nmeter packet (MUB2(meter_urb, s) - 1) and uses it to index those\narrays without validating the range. If the packet contains a\nnegative or out-of-range channel number, the driver may write past\nthe end of these arrays.\n\nIntroduce a local channel variable and validate it before updating the\narrays. We reject negative indices, limit meter_level[] and\ncomp_level[] to SND_US16X08_MAX_CHANNELS, and guard master_level[]\nupdates with ARRAY_SIZE(master_level).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68783",
"url": "https://www.suse.com/security/cve/CVE-2025-68783"
},
{
"category": "external",
"summary": "SUSE Bug 1256650 for CVE-2025-68783",
"url": "https://bugzilla.suse.com/1256650"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68783"
},
{
"cve": "CVE-2025-68788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsnotify: do not generate ACCESS/MODIFY events on child for special files\n\ninotify/fanotify do not allow users with no read access to a file to\nsubscribe to events (e.g. IN_ACCESS/IN_MODIFY), but they do allow the\nsame user to subscribe for watching events on children when the user\nhas access to the parent directory (e.g. /dev).\n\nUsers with no read access to a file but with read access to its parent\ndirectory can still stat the file and see if it was accessed/modified\nvia atime/mtime change.\n\nThe same is not true for special files (e.g. /dev/null). Users will not\ngenerally observe atime/mtime changes when other users read/write to\nspecial files, only when someone sets atime/mtime via utimensat().\n\nAlign fsnotify events with this stat behavior and do not generate\nACCESS/MODIFY events to parent watchers on read/write of special files.\nThe events are still generated to parent watchers on utimensat(). This\ncloses some side-channels that could be possibly used for information\nexfiltration [1].\n\n[1] https://snee.la/pdf/pubs/file-notification-attacks.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68788",
"url": "https://www.suse.com/security/cve/CVE-2025-68788"
},
{
"category": "external",
"summary": "SUSE Bug 1256638 for CVE-2025-68788",
"url": "https://bugzilla.suse.com/1256638"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68788"
},
{
"cve": "CVE-2025-68795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68795"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: Avoid overflowing userspace buffer on stats query\n\nThe ethtool -S command operates across three ioctl calls:\nETHTOOL_GSSET_INFO for the size, ETHTOOL_GSTRINGS for the names, and\nETHTOOL_GSTATS for the values.\n\nIf the number of stats changes between these calls (e.g., due to device\nreconfiguration), userspace\u0027s buffer allocation will be incorrect,\npotentially leading to buffer overflow.\n\nDrivers are generally expected to maintain stable stat counts, but some\ndrivers (e.g., mlx5, bnx2x, bna, ksz884x) use dynamic counters, making\nthis scenario possible.\n\nSome drivers try to handle this internally:\n- bnad_get_ethtool_stats() returns early in case stats.n_stats is not\n equal to the driver\u0027s stats count.\n- micrel/ksz884x also makes sure not to write anything beyond\n stats.n_stats and overflow the buffer.\n\nHowever, both use stats.n_stats which is already assigned with the value\nreturned from get_sset_count(), hence won\u0027t solve the issue described\nhere.\n\nChange ethtool_get_strings(), ethtool_get_stats(),\nethtool_get_phy_stats() to not return anything in case of a mismatch\nbetween userspace\u0027s size and get_sset_size(), to prevent buffer\noverflow.\nThe returned n_stats value will be equal to zero, to reflect that\nnothing has been returned.\n\nThis could result in one of two cases when using upstream ethtool,\ndepending on when the size change is detected:\n1. When detected in ethtool_get_strings():\n # ethtool -S eth2\n no stats available\n\n2. When detected in get stats, all stats will be reported as zero.\n\nBoth cases are presumably transient, and a subsequent ethtool call\nshould succeed.\n\nOther than the overflow avoidance, these two cases are very evident (no\noutput/cleared stats), which is arguably better than presenting\nincorrect/shifted stats.\nI also considered returning an error instead of a \"silent\" response, but\nthat seems more destructive towards userspace apps.\n\nNotes:\n- This patch does not claim to fix the inherent race, it only makes sure\n that we do not overflow the userspace buffer, and makes for a more\n predictable behavior.\n\n- RTNL lock is held during each ioctl, the race window exists between\n the separate ioctl calls when the lock is released.\n\n- Userspace ethtool always fills stats.n_stats, but it is likely that\n these stats ioctls are implemented in other userspace applications\n which might not fill it. The added code checks that it\u0027s not zero,\n to prevent any regressions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68795",
"url": "https://www.suse.com/security/cve/CVE-2025-68795"
},
{
"category": "external",
"summary": "SUSE Bug 1256688 for CVE-2025-68795",
"url": "https://bugzilla.suse.com/1256688"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68795"
},
{
"cve": "CVE-2025-68797",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68797"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nchar: applicom: fix NULL pointer dereference in ac_ioctl\n\nDiscovered by Atuin - Automated Vulnerability Discovery Engine.\n\nIn ac_ioctl, the validation of IndexCard and the check for a valid\nRamIO pointer are skipped when cmd is 6. However, the function\nunconditionally executes readb(apbs[IndexCard].RamIO + VERS) at the\nend.\n\nIf cmd is 6, IndexCard may reference a board that does not exist\n(where RamIO is NULL), leading to a NULL pointer dereference.\n\nFix this by skipping the readb access when cmd is 6, as this\ncommand is a global information query and does not target a specific\nboard context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68797",
"url": "https://www.suse.com/security/cve/CVE-2025-68797"
},
{
"category": "external",
"summary": "SUSE Bug 1256660 for CVE-2025-68797",
"url": "https://bugzilla.suse.com/1256660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68797"
},
{
"cve": "CVE-2025-68813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68813"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix ipv4 null-ptr-deref in route error path\n\nThe IPv4 code path in __ip_vs_get_out_rt() calls dst_link_failure()\nwithout ensuring skb-\u003edev is set, leading to a NULL pointer dereference\nin fib_compute_spec_dst() when ipv4_link_failure() attempts to send\nICMP destination unreachable messages.\n\nThe issue emerged after commit ed0de45a1008 (\"ipv4: recompile ip options\nin ipv4_link_failure\") started calling __ip_options_compile() from\nipv4_link_failure(). This code path eventually calls fib_compute_spec_dst()\nwhich dereferences skb-\u003edev. An attempt was made to fix the NULL skb-\u003edev\ndereference in commit 0113d9c9d1cc (\"ipv4: fix null-deref in\nipv4_link_failure\"), but it only addressed the immediate dev_net(skb-\u003edev)\ndereference by using a fallback device. The fix was incomplete because\nfib_compute_spec_dst() later in the call chain still accesses skb-\u003edev\ndirectly, which remains NULL when IPVS calls dst_link_failure().\n\nThe crash occurs when:\n1. IPVS processes a packet in NAT mode with a misconfigured destination\n2. Route lookup fails in __ip_vs_get_out_rt() before establishing a route\n3. The error path calls dst_link_failure(skb) with skb-\u003edev == NULL\n4. ipv4_link_failure() -\u003e ipv4_send_dest_unreach() -\u003e\n __ip_options_compile() -\u003e fib_compute_spec_dst()\n5. fib_compute_spec_dst() dereferences NULL skb-\u003edev\n\nApply the same fix used for IPv6 in commit 326bf17ea5d4 (\"ipvs: fix\nipv6 route unreach panic\"): set skb-\u003edev from skb_dst(skb)-\u003edev before\ncalling dst_link_failure().\n\nKASAN: null-ptr-deref in range [0x0000000000000328-0x000000000000032f]\nCPU: 1 PID: 12732 Comm: syz.1.3469 Not tainted 6.6.114 #2\nRIP: 0010:__in_dev_get_rcu include/linux/inetdevice.h:233\nRIP: 0010:fib_compute_spec_dst+0x17a/0x9f0 net/ipv4/fib_frontend.c:285\nCall Trace:\n \u003cTASK\u003e\n spec_dst_fill net/ipv4/ip_options.c:232\n spec_dst_fill net/ipv4/ip_options.c:229\n __ip_options_compile+0x13a1/0x17d0 net/ipv4/ip_options.c:330\n ipv4_send_dest_unreach net/ipv4/route.c:1252\n ipv4_link_failure+0x702/0xb80 net/ipv4/route.c:1265\n dst_link_failure include/net/dst.h:437\n __ip_vs_get_out_rt+0x15fd/0x19e0 net/netfilter/ipvs/ip_vs_xmit.c:412\n ip_vs_nat_xmit+0x1d8/0xc80 net/netfilter/ipvs/ip_vs_xmit.c:764",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68813",
"url": "https://www.suse.com/security/cve/CVE-2025-68813"
},
{
"category": "external",
"summary": "SUSE Bug 1256641 for CVE-2025-68813",
"url": "https://bugzilla.suse.com/1256641"
},
{
"category": "external",
"summary": "SUSE Bug 1256644 for CVE-2025-68813",
"url": "https://bugzilla.suse.com/1256644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "important"
}
],
"title": "CVE-2025-68813"
},
{
"cve": "CVE-2025-68816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68816"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: fw_tracer, Validate format string parameters\n\nAdd validation for format string parameters in the firmware tracer to\nprevent potential security vulnerabilities and crashes from malformed\nformat strings received from firmware.\n\nThe firmware tracer receives format strings from the device firmware and\nuses them to format trace messages. Without proper validation, bad\nfirmware could provide format strings with invalid format specifiers\n(e.g., %s, %p, %n) that could lead to crashes, or other undefined\nbehavior.\n\nAdd mlx5_tracer_validate_params() to validate that all format specifiers\nin trace strings are limited to safe integer/hex formats (%x, %d, %i,\n%u, %llx, %lx, etc.). Reject strings containing other format types that\ncould be used to access arbitrary memory or cause crashes.\nInvalid format strings are added to the trace output for visibility with\n\"BAD_FORMAT: \" prefix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68816",
"url": "https://www.suse.com/security/cve/CVE-2025-68816"
},
{
"category": "external",
"summary": "SUSE Bug 1256674 for CVE-2025-68816",
"url": "https://bugzilla.suse.com/1256674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-68816"
},
{
"cve": "CVE-2025-71064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: using the num_tqps in the vf driver to apply for resources\n\nCurrently, hdev-\u003ehtqp is allocated using hdev-\u003enum_tqps, and kinfo-\u003etqp\nis allocated using kinfo-\u003enum_tqps. However, kinfo-\u003enum_tqps is set to\nmin(new_tqps, hdev-\u003enum_tqps); Therefore, kinfo-\u003enum_tqps may be smaller\nthan hdev-\u003enum_tqps, which causes some hdev-\u003ehtqp[i] to remain\nuninitialized in hclgevf_knic_setup().\n\nThus, this patch allocates hdev-\u003ehtqp and kinfo-\u003etqp using hdev-\u003enum_tqps,\nensuring that the lengths of hdev-\u003ehtqp and kinfo-\u003etqp are consistent\nand that all elements are properly initialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71064",
"url": "https://www.suse.com/security/cve/CVE-2025-71064"
},
{
"category": "external",
"summary": "SUSE Bug 1256654 for CVE-2025-71064",
"url": "https://bugzilla.suse.com/1256654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-71064"
},
{
"cve": "CVE-2025-71082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71082"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: revert use of devm_kzalloc in btusb\n\nThis reverts commit 98921dbd00c4e (\"Bluetooth: Use devm_kzalloc in\nbtusb.c file\").\n\nIn btusb_probe(), we use devm_kzalloc() to allocate the btusb data. This\nties the lifetime of all the btusb data to the binding of a driver to\none interface, INTF. In a driver that binds to other interfaces, ISOC\nand DIAG, this is an accident waiting to happen.\n\nThe issue is revealed in btusb_disconnect(), where calling\nusb_driver_release_interface(\u0026btusb_driver, data-\u003eintf) will have devm\nfree the data that is also being used by the other interfaces of the\ndriver that may not be released yet.\n\nTo fix this, revert the use of devm and go back to freeing memory\nexplicitly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71082",
"url": "https://www.suse.com/security/cve/CVE-2025-71082"
},
{
"category": "external",
"summary": "SUSE Bug 1256611 for CVE-2025-71082",
"url": "https://bugzilla.suse.com/1256611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-71082"
},
{
"cve": "CVE-2025-71085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()\n\nThere exists a kernel oops caused by a BUG_ON(nhead \u003c 0) at\nnet/core/skbuff.c:2232 in pskb_expand_head().\nThis bug is triggered as part of the calipso_skbuff_setattr()\nroutine when skb_cow() is passed headroom \u003e INT_MAX\n(i.e. (int)(skb_headroom(skb) + len_delta) \u003c 0).\n\nThe root cause of the bug is due to an implicit integer cast in\n__skb_cow(). The check (headroom \u003e skb_headroom(skb)) is meant to ensure\nthat delta = headroom - skb_headroom(skb) is never negative, otherwise\nwe will trigger a BUG_ON in pskb_expand_head(). However, if\nheadroom \u003e INT_MAX and delta \u003c= -NET_SKB_PAD, the check passes, delta\nbecomes negative, and pskb_expand_head() is passed a negative value for\nnhead.\n\nFix the trigger condition in calipso_skbuff_setattr(). Avoid passing\n\"negative\" headroom sizes to skb_cow() within calipso_skbuff_setattr()\nby only using skb_cow() to grow headroom.\n\nPoC:\n\tUsing `netlabelctl` tool:\n\n netlabelctl map del default\n netlabelctl calipso add pass doi:7\n netlabelctl map add default address:0::1/128 protocol:calipso,7\n\n Then run the following PoC:\n\n int fd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);\n\n // setup msghdr\n int cmsg_size = 2;\n int cmsg_len = 0x60;\n struct msghdr msg;\n struct sockaddr_in6 dest_addr;\n struct cmsghdr * cmsg = (struct cmsghdr *) calloc(1,\n sizeof(struct cmsghdr) + cmsg_len);\n msg.msg_name = \u0026dest_addr;\n msg.msg_namelen = sizeof(dest_addr);\n msg.msg_iov = NULL;\n msg.msg_iovlen = 0;\n msg.msg_control = cmsg;\n msg.msg_controllen = cmsg_len;\n msg.msg_flags = 0;\n\n // setup sockaddr\n dest_addr.sin6_family = AF_INET6;\n dest_addr.sin6_port = htons(31337);\n dest_addr.sin6_flowinfo = htonl(31337);\n dest_addr.sin6_addr = in6addr_loopback;\n dest_addr.sin6_scope_id = 31337;\n\n // setup cmsghdr\n cmsg-\u003ecmsg_len = cmsg_len;\n cmsg-\u003ecmsg_level = IPPROTO_IPV6;\n cmsg-\u003ecmsg_type = IPV6_HOPOPTS;\n char * hop_hdr = (char *)cmsg + sizeof(struct cmsghdr);\n hop_hdr[1] = 0x9; //set hop size - (0x9 + 1) * 8 = 80\n\n sendmsg(fd, \u0026msg, 0);",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71085",
"url": "https://www.suse.com/security/cve/CVE-2025-71085"
},
{
"category": "external",
"summary": "SUSE Bug 1256623 for CVE-2025-71085",
"url": "https://bugzilla.suse.com/1256623"
},
{
"category": "external",
"summary": "SUSE Bug 1256624 for CVE-2025-71085",
"url": "https://bugzilla.suse.com/1256624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "important"
}
],
"title": "CVE-2025-71085"
},
{
"cve": "CVE-2025-71087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71087"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: fix off-by-one issues in iavf_config_rss_reg()\n\nThere are off-by-one bugs when configuring RSS hash key and lookup\ntable, causing out-of-bounds reads to memory [1] and out-of-bounds\nwrites to device registers.\n\nBefore commit 43a3d9ba34c9 (\"i40evf: Allow PF driver to configure RSS\"),\nthe loop upper bounds were:\n i \u003c= I40E_VFQF_{HKEY,HLUT}_MAX_INDEX\nwhich is safe since the value is the last valid index.\n\nThat commit changed the bounds to:\n i \u003c= adapter-\u003erss_{key,lut}_size / 4\nwhere `rss_{key,lut}_size / 4` is the number of dwords, so the last\nvalid index is `(rss_{key,lut}_size / 4) - 1`. Therefore, using `\u003c=`\naccesses one element past the end.\n\nFix the issues by using `\u003c` instead of `\u003c=`, ensuring we do not exceed\nthe bounds.\n\n[1] KASAN splat about rss_key_size off-by-one\n BUG: KASAN: slab-out-of-bounds in iavf_config_rss+0x619/0x800\n Read of size 4 at addr ffff888102c50134 by task kworker/u8:6/63\n\n CPU: 0 UID: 0 PID: 63 Comm: kworker/u8:6 Not tainted 6.18.0-rc2-enjuk-tnguy-00378-g3005f5b77652-dirty #156 PREEMPT(voluntary)\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n Workqueue: iavf iavf_watchdog_task\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6f/0xb0\n print_report+0x170/0x4f3\n kasan_report+0xe1/0x1a0\n iavf_config_rss+0x619/0x800\n iavf_watchdog_task+0x2be7/0x3230\n process_one_work+0x7fd/0x1420\n worker_thread+0x4d1/0xd40\n kthread+0x344/0x660\n ret_from_fork+0x249/0x320\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\n\n Allocated by task 63:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n __kmalloc_noprof+0x246/0x6f0\n iavf_watchdog_task+0x28fc/0x3230\n process_one_work+0x7fd/0x1420\n worker_thread+0x4d1/0xd40\n kthread+0x344/0x660\n ret_from_fork+0x249/0x320\n ret_from_fork_asm+0x1a/0x30\n\n The buggy address belongs to the object at ffff888102c50100\n which belongs to the cache kmalloc-64 of size 64\n The buggy address is located 0 bytes to the right of\n allocated 52-byte region [ffff888102c50100, ffff888102c50134)\n\n The buggy address belongs to the physical page:\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c50\n flags: 0x200000000000000(node=0|zone=2)\n page_type: f5(slab)\n raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000\n raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n ffff888102c50000: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc\n ffff888102c50080: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc\n \u003effff888102c50100: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc\n ^\n ffff888102c50180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc\n ffff888102c50200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71087",
"url": "https://www.suse.com/security/cve/CVE-2025-71087"
},
{
"category": "external",
"summary": "SUSE Bug 1256628 for CVE-2025-71087",
"url": "https://bugzilla.suse.com/1256628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-71087"
},
{
"cve": "CVE-2025-71091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nteam: fix check for port enabled in team_queue_override_port_prio_changed()\n\nThere has been a syzkaller bug reported recently with the following\ntrace:\n\nlist_del corruption, ffff888058bea080-\u003eprev is LIST_POISON2 (dead000000000122)\n------------[ cut here ]------------\nkernel BUG at lib/list_debug.c:59!\nOops: invalid opcode: 0000 [#1] SMP KASAN NOPTI\nCPU: 3 UID: 0 PID: 21246 Comm: syz.0.2928 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nRIP: 0010:__list_del_entry_valid_or_report+0x13e/0x200 lib/list_debug.c:59\nCode: 48 c7 c7 e0 71 f0 8b e8 30 08 ef fc 90 0f 0b 48 89 ef e8 a5 02 55 fd 48 89 ea 48 89 de 48 c7 c7 40 72 f0 8b e8 13 08 ef fc 90 \u003c0f\u003e 0b 48 89 ef e8 88 02 55 fd 48 89 ea 48 b8 00 00 00 00 00 fc ff\nRSP: 0018:ffffc9000d49f370 EFLAGS: 00010286\nRAX: 000000000000004e RBX: ffff888058bea080 RCX: ffffc9002817d000\nRDX: 0000000000000000 RSI: ffffffff819becc6 RDI: 0000000000000005\nRBP: dead000000000122 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000080000000 R11: 0000000000000001 R12: ffff888039e9c230\nR13: ffff888058bea088 R14: ffff888058bea080 R15: ffff888055461480\nFS: 00007fbbcfe6f6c0(0000) GS:ffff8880d6d0a000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000110c3afcb0 CR3: 00000000382c7000 CR4: 0000000000352ef0\nCall Trace:\n \u003cTASK\u003e\n __list_del_entry_valid include/linux/list.h:132 [inline]\n __list_del_entry include/linux/list.h:223 [inline]\n list_del_rcu include/linux/rculist.h:178 [inline]\n __team_queue_override_port_del drivers/net/team/team_core.c:826 [inline]\n __team_queue_override_port_del drivers/net/team/team_core.c:821 [inline]\n team_queue_override_port_prio_changed drivers/net/team/team_core.c:883 [inline]\n team_priority_option_set+0x171/0x2f0 drivers/net/team/team_core.c:1534\n team_option_set drivers/net/team/team_core.c:376 [inline]\n team_nl_options_set_doit+0x8ae/0xe60 drivers/net/team/team_core.c:2653\n genl_family_rcv_msg_doit+0x209/0x2f0 net/netlink/genetlink.c:1115\n genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\n genl_rcv_msg+0x55c/0x800 net/netlink/genetlink.c:1210\n netlink_rcv_skb+0x158/0x420 net/netlink/af_netlink.c:2552\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\n netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]\n netlink_unicast+0x5aa/0x870 net/netlink/af_netlink.c:1346\n netlink_sendmsg+0x8c8/0xdd0 net/netlink/af_netlink.c:1896\n sock_sendmsg_nosec net/socket.c:727 [inline]\n __sock_sendmsg net/socket.c:742 [inline]\n ____sys_sendmsg+0xa98/0xc70 net/socket.c:2630\n ___sys_sendmsg+0x134/0x1d0 net/socket.c:2684\n __sys_sendmsg+0x16d/0x220 net/socket.c:2716\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nThe problem is in this flow:\n1) Port is enabled, queue_id != 0, in qom_list\n2) Port gets disabled\n -\u003e team_port_disable()\n -\u003e team_queue_override_port_del()\n -\u003e del (removed from list)\n3) Port is disabled, queue_id != 0, not in any list\n4) Priority changes\n -\u003e team_queue_override_port_prio_changed()\n -\u003e checks: port disabled \u0026\u0026 queue_id != 0\n -\u003e calls del - hits the BUG as it is removed already\n\nTo fix this, change the check in team_queue_override_port_prio_changed()\nso it returns early if port is not enabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71091",
"url": "https://www.suse.com/security/cve/CVE-2025-71091"
},
{
"category": "external",
"summary": "SUSE Bug 1256773 for CVE-2025-71091",
"url": "https://bugzilla.suse.com/1256773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-71091"
},
{
"cve": "CVE-2025-71093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71093"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ne1000: fix OOB in e1000_tbi_should_accept()\n\nIn e1000_tbi_should_accept() we read the last byte of the frame via\n\u0027data[length - 1]\u0027 to evaluate the TBI workaround. If the descriptor-\nreported length is zero or larger than the actual RX buffer size, this\nread goes out of bounds and can hit unrelated slab objects. The issue\nis observed from the NAPI receive path (e1000_clean_rx_irq):\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in e1000_tbi_should_accept+0x610/0x790\nRead of size 1 at addr ffff888014114e54 by task sshd/363\n\nCPU: 0 PID: 363 Comm: sshd Not tainted 5.18.0-rc1 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x5a/0x74\n print_address_description+0x7b/0x440\n print_report+0x101/0x200\n kasan_report+0xc1/0xf0\n e1000_tbi_should_accept+0x610/0x790\n e1000_clean_rx_irq+0xa8c/0x1110\n e1000_clean+0xde2/0x3c10\n __napi_poll+0x98/0x380\n net_rx_action+0x491/0xa20\n __do_softirq+0x2c9/0x61d\n do_softirq+0xd1/0x120\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n __local_bh_enable_ip+0xfe/0x130\n ip_finish_output2+0x7d5/0xb00\n __ip_queue_xmit+0xe24/0x1ab0\n __tcp_transmit_skb+0x1bcb/0x3340\n tcp_write_xmit+0x175d/0x6bd0\n __tcp_push_pending_frames+0x7b/0x280\n tcp_sendmsg_locked+0x2e4f/0x32d0\n tcp_sendmsg+0x24/0x40\n sock_write_iter+0x322/0x430\n vfs_write+0x56c/0xa60\n ksys_write+0xd1/0x190\n do_syscall_64+0x43/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f511b476b10\nCode: 73 01 c3 48 8b 0d 88 d3 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d f9 2b 2c 00 00 75 10 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 8e 9b 01 00 48 89 04 24\nRSP: 002b:00007ffc9211d4e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 0000000000004024 RCX: 00007f511b476b10\nRDX: 0000000000004024 RSI: 0000559a9385962c RDI: 0000000000000003\nRBP: 0000559a9383a400 R08: fffffffffffffff0 R09: 0000000000004f00\nR10: 0000000000000070 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007ffc9211d57f R14: 0000559a9347bde7 R15: 0000000000000003\n \u003c/TASK\u003e\nAllocated by task 1:\n __kasan_krealloc+0x131/0x1c0\n krealloc+0x90/0xc0\n add_sysfs_param+0xcb/0x8a0\n kernel_add_sysfs_param+0x81/0xd4\n param_sysfs_builtin+0x138/0x1a6\n param_sysfs_init+0x57/0x5b\n do_one_initcall+0x104/0x250\n do_initcall_level+0x102/0x132\n do_initcalls+0x46/0x74\n kernel_init_freeable+0x28f/0x393\n kernel_init+0x14/0x1a0\n ret_from_fork+0x22/0x30\nThe buggy address belongs to the object at ffff888014114000\n which belongs to the cache kmalloc-2k of size 2048\nThe buggy address is located 1620 bytes to the right of\n 2048-byte region [ffff888014114000, ffff888014114800]\nThe buggy address belongs to the physical page:\npage:ffffea0000504400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14110\nhead:ffffea0000504400 order:3 compound_mapcount:0 compound_pincount:0\nflags: 0x100000000010200(slab|head|node=0|zone=1)\nraw: 0100000000010200 0000000000000000 dead000000000001 ffff888013442000\nraw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n==================================================================\n\nThis happens because the TBI check unconditionally dereferences the last\nbyte without validating the reported length first:\n\n\tu8 last_byte = *(data + length - 1);\n\nFix by rejecting the frame early if the length is zero, or if it exceeds\nadapter-\u003erx_buffer_len. This preserves the TBI workaround semantics for\nvalid frames and prevents touching memory beyond the RX buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71093",
"url": "https://www.suse.com/security/cve/CVE-2025-71093"
},
{
"category": "external",
"summary": "SUSE Bug 1256777 for CVE-2025-71093",
"url": "https://bugzilla.suse.com/1256777"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-71093"
},
{
"cve": "CVE-2025-71096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly\n\nThe netlink response for RDMA_NL_LS_OP_IP_RESOLVE should always have a\nLS_NLA_TYPE_DGID attribute, it is invalid if it does not.\n\nUse the nl parsing logic properly and call nla_parse_deprecated() to fill\nthe nlattrs array and then directly index that array to get the data for\nthe DGID. Just fail if it is NULL.\n\nRemove the for loop searching for the nla, and squash the validation and\nparsing into one function.\n\nFixes an uninitialized read from the stack triggered by userspace if it\ndoes not provide the DGID to a kernel initiated RDMA_NL_LS_OP_IP_RESOLVE\nquery.\n\n BUG: KMSAN: uninit-value in hex_byte_pack include/linux/hex.h:13 [inline]\n BUG: KMSAN: uninit-value in ip6_string+0xef4/0x13a0 lib/vsprintf.c:1490\n hex_byte_pack include/linux/hex.h:13 [inline]\n ip6_string+0xef4/0x13a0 lib/vsprintf.c:1490\n ip6_addr_string+0x18a/0x3e0 lib/vsprintf.c:1509\n ip_addr_string+0x245/0xee0 lib/vsprintf.c:1633\n pointer+0xc09/0x1bd0 lib/vsprintf.c:2542\n vsnprintf+0xf8a/0x1bd0 lib/vsprintf.c:2930\n vprintk_store+0x3ae/0x1530 kernel/printk/printk.c:2279\n vprintk_emit+0x307/0xcd0 kernel/printk/printk.c:2426\n vprintk_default+0x3f/0x50 kernel/printk/printk.c:2465\n vprintk+0x36/0x50 kernel/printk/printk_safe.c:82\n _printk+0x17e/0x1b0 kernel/printk/printk.c:2475\n ib_nl_process_good_ip_rsep drivers/infiniband/core/addr.c:128 [inline]\n ib_nl_handle_ip_res_resp+0x963/0x9d0 drivers/infiniband/core/addr.c:141\n rdma_nl_rcv_msg drivers/infiniband/core/netlink.c:-1 [inline]\n rdma_nl_rcv_skb drivers/infiniband/core/netlink.c:239 [inline]\n rdma_nl_rcv+0xefa/0x11c0 drivers/infiniband/core/netlink.c:259\n netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]\n netlink_unicast+0xf04/0x12b0 net/netlink/af_netlink.c:1346\n netlink_sendmsg+0x10b3/0x1250 net/netlink/af_netlink.c:1896\n sock_sendmsg_nosec net/socket.c:714 [inline]\n __sock_sendmsg+0x333/0x3d0 net/socket.c:729\n ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2617\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2671\n __sys_sendmsg+0x1aa/0x300 net/socket.c:2703\n __compat_sys_sendmsg net/compat.c:346 [inline]\n __do_compat_sys_sendmsg net/compat.c:353 [inline]\n __se_compat_sys_sendmsg net/compat.c:350 [inline]\n __ia32_compat_sys_sendmsg+0xa4/0x100 net/compat.c:350\n ia32_sys_call+0x3f6c/0x4310 arch/x86/include/generated/asm/syscalls_32.h:371\n do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]\n __do_fast_syscall_32+0xb0/0x150 arch/x86/entry/syscall_32.c:306\n do_fast_syscall_32+0x38/0x80 arch/x86/entry/syscall_32.c:331\n do_SYSENTER_32+0x1f/0x30 arch/x86/entry/syscall_32.c:3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71096",
"url": "https://www.suse.com/security/cve/CVE-2025-71096"
},
{
"category": "external",
"summary": "SUSE Bug 1256606 for CVE-2025-71096",
"url": "https://bugzilla.suse.com/1256606"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-71096"
},
{
"cve": "CVE-2025-71098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_gre: make ip6gre_header() robust\n\nOver the years, syzbot found many ways to crash the kernel\nin ip6gre_header() [1].\n\nThis involves team or bonding drivers ability to dynamically\nchange their dev-\u003eneeded_headroom and/or dev-\u003ehard_header_len\n\nIn this particular crash mld_newpack() allocated an skb\nwith a too small reserve/headroom, and by the time mld_sendpack()\nwas called, syzbot managed to attach an ip6gre device.\n\n[1]\nskbuff: skb_under_panic: text:ffffffff8a1d69a8 len:136 put:40 head:ffff888059bc7000 data:ffff888059bc6fe8 tail:0x70 end:0x6c0 dev:team0\n------------[ cut here ]------------\n kernel BUG at net/core/skbuff.c:213 !\n \u003cTASK\u003e\n skb_under_panic net/core/skbuff.c:223 [inline]\n skb_push+0xc3/0xe0 net/core/skbuff.c:2641\n ip6gre_header+0xc8/0x790 net/ipv6/ip6_gre.c:1371\n dev_hard_header include/linux/netdevice.h:3436 [inline]\n neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618\n neigh_output include/net/neighbour.h:556 [inline]\n ip6_finish_output2+0xfb3/0x1480 net/ipv6/ip6_output.c:136\n __ip6_finish_output net/ipv6/ip6_output.c:-1 [inline]\n ip6_finish_output+0x234/0x7d0 net/ipv6/ip6_output.c:220\n NF_HOOK_COND include/linux/netfilter.h:307 [inline]\n ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247\n NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318\n mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855\n mld_send_cr net/ipv6/mcast.c:2154 [inline]\n mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71098",
"url": "https://www.suse.com/security/cve/CVE-2025-71098"
},
{
"category": "external",
"summary": "SUSE Bug 1256591 for CVE-2025-71098",
"url": "https://bugzilla.suse.com/1256591"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-71098"
},
{
"cve": "CVE-2025-71108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71108"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Handle incorrect num_connectors capability\n\nThe UCSI spec states that the num_connectors field is 7 bits, and the\n8th bit is reserved and should be set to zero.\nSome buggy FW has been known to set this bit, and it can lead to a\nsystem not booting.\nFlag that the FW is not behaving correctly, and auto-fix the value\nso that the system boots correctly.\n\nFound on Lenovo P1 G8 during Linux enablement program. The FW will\nbe fixed, but seemed worth addressing in case it hit platforms that\naren\u0027t officially Linux supported.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71108",
"url": "https://www.suse.com/security/cve/CVE-2025-71108"
},
{
"category": "external",
"summary": "SUSE Bug 1256774 for CVE-2025-71108",
"url": "https://bugzilla.suse.com/1256774"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-71108"
},
{
"cve": "CVE-2025-71112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71112"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: add VLAN id validation before using\n\nCurrently, the VLAN id may be used without validation when\nreceive a VLAN configuration mailbox from VF. The length of\nvlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_VID). It may cause\nout-of-bounds memory access once the VLAN id is bigger than\nor equal to VLAN_N_VID.\n\nTherefore, VLAN id needs to be checked to ensure it is within\nthe range of VLAN_N_VID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71112",
"url": "https://www.suse.com/security/cve/CVE-2025-71112"
},
{
"category": "external",
"summary": "SUSE Bug 1256726 for CVE-2025-71112",
"url": "https://bugzilla.suse.com/1256726"
},
{
"category": "external",
"summary": "SUSE Bug 1256727 for CVE-2025-71112",
"url": "https://bugzilla.suse.com/1256727"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "important"
}
],
"title": "CVE-2025-71112"
},
{
"cve": "CVE-2025-71119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71119"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/kexec: Enable SMT before waking offline CPUs\n\nIf SMT is disabled or a partial SMT state is enabled, when a new kernel\nimage is loaded for kexec, on reboot the following warning is observed:\n\nkexec: Waking offline cpu 228.\nWARNING: CPU: 0 PID: 9062 at arch/powerpc/kexec/core_64.c:223 kexec_prepare_cpus+0x1b0/0x1bc\n[snip]\n NIP kexec_prepare_cpus+0x1b0/0x1bc\n LR kexec_prepare_cpus+0x1a0/0x1bc\n Call Trace:\n kexec_prepare_cpus+0x1a0/0x1bc (unreliable)\n default_machine_kexec+0x160/0x19c\n machine_kexec+0x80/0x88\n kernel_kexec+0xd0/0x118\n __do_sys_reboot+0x210/0x2c4\n system_call_exception+0x124/0x320\n system_call_vectored_common+0x15c/0x2ec\n\nThis occurs as add_cpu() fails due to cpu_bootable() returning false for\nCPUs that fail the cpu_smt_thread_allowed() check or non primary\nthreads if SMT is disabled.\n\nFix the issue by enabling SMT and resetting the number of SMT threads to\nthe number of threads per core, before attempting to wake up all present\nCPUs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71119",
"url": "https://www.suse.com/security/cve/CVE-2025-71119"
},
{
"category": "external",
"summary": "SUSE Bug 1256730 for CVE-2025-71119",
"url": "https://bugzilla.suse.com/1256730"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-71119"
},
{
"cve": "CVE-2025-71120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf\n\nA zero length gss_token results in pages == 0 and in_token-\u003epages[0]\nis NULL. The code unconditionally evaluates\npage_address(in_token-\u003epages[0]) for the initial memcpy, which can\ndereference NULL even when the copy length is 0. Guard the first\nmemcpy so it only runs when length \u003e 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71120",
"url": "https://www.suse.com/security/cve/CVE-2025-71120"
},
{
"category": "external",
"summary": "SUSE Bug 1256779 for CVE-2025-71120",
"url": "https://bugzilla.suse.com/1256779"
},
{
"category": "external",
"summary": "SUSE Bug 1256780 for CVE-2025-71120",
"url": "https://bugzilla.suse.com/1256780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "important"
}
],
"title": "CVE-2025-71120"
},
{
"cve": "CVE-2025-71123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71123"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix string copying in parse_apply_sb_mount_options()\n\nstrscpy_pad() can\u0027t be used to copy a non-NUL-term string into a NUL-term\nstring of possibly bigger size. Commit 0efc5990bca5 (\"string.h: Introduce\nmemtostr() and memtostr_pad()\") provides additional information in that\nregard. So if this happens, the following warning is observed:\n\nstrnlen: detected buffer overflow: 65 byte read of buffer size 64\nWARNING: CPU: 0 PID: 28655 at lib/string_helpers.c:1032 __fortify_report+0x96/0xc0 lib/string_helpers.c:1032\nModules linked in:\nCPU: 0 UID: 0 PID: 28655 Comm: syz-executor.3 Not tainted 6.12.54-syzkaller-00144-g5f0270f1ba00 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\nRIP: 0010:__fortify_report+0x96/0xc0 lib/string_helpers.c:1032\nCall Trace:\n \u003cTASK\u003e\n __fortify_panic+0x1f/0x30 lib/string_helpers.c:1039\n strnlen include/linux/fortify-string.h:235 [inline]\n sized_strscpy include/linux/fortify-string.h:309 [inline]\n parse_apply_sb_mount_options fs/ext4/super.c:2504 [inline]\n __ext4_fill_super fs/ext4/super.c:5261 [inline]\n ext4_fill_super+0x3c35/0xad00 fs/ext4/super.c:5706\n get_tree_bdev_flags+0x387/0x620 fs/super.c:1636\n vfs_get_tree+0x93/0x380 fs/super.c:1814\n do_new_mount fs/namespace.c:3553 [inline]\n path_mount+0x6ae/0x1f70 fs/namespace.c:3880\n do_mount fs/namespace.c:3893 [inline]\n __do_sys_mount fs/namespace.c:4103 [inline]\n __se_sys_mount fs/namespace.c:4080 [inline]\n __x64_sys_mount+0x280/0x300 fs/namespace.c:4080\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x64/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nSince userspace is expected to provide s_mount_opts field to be at most 63\ncharacters long with the ending byte being NUL-term, use a 64-byte buffer\nwhich matches the size of s_mount_opts, so that strscpy_pad() does its job\nproperly. Return with error if the user still managed to provide a\nnon-NUL-term string here.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71123",
"url": "https://www.suse.com/security/cve/CVE-2025-71123"
},
{
"category": "external",
"summary": "SUSE Bug 1256757 for CVE-2025-71123",
"url": "https://bugzilla.suse.com/1256757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-71123"
},
{
"cve": "CVE-2026-22976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22976"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset\n\n`qfq_class-\u003eleaf_qdisc-\u003eq.qlen \u003e 0` does not imply that the class\nitself is active.\n\nTwo qfq_class objects may point to the same leaf_qdisc. This happens\nwhen:\n\n1. one QFQ qdisc is attached to the dev as the root qdisc, and\n\n2. another QFQ qdisc is temporarily referenced (e.g., via qdisc_get()\n/ qdisc_put()) and is pending to be destroyed, as in function\ntc_new_tfilter.\n\nWhen packets are enqueued through the root QFQ qdisc, the shared\nleaf_qdisc-\u003eq.qlen increases. At the same time, the second QFQ\nqdisc triggers qdisc_put and qdisc_destroy: the qdisc enters\nqfq_reset() with its own q-\u003eq.qlen == 0, but its class\u0027s leaf\nqdisc-\u003eq.qlen \u003e 0. Therefore, the qfq_reset would wrongly deactivate\nan inactive aggregate and trigger a null-deref in qfq_deactivate_agg:\n\n[ 0.903172] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 0.903571] #PF: supervisor write access in kernel mode\n[ 0.903860] #PF: error_code(0x0002) - not-present page\n[ 0.904177] PGD 10299b067 P4D 10299b067 PUD 10299c067 PMD 0\n[ 0.904502] Oops: Oops: 0002 [#1] SMP NOPTI\n[ 0.904737] CPU: 0 UID: 0 PID: 135 Comm: exploit Not tainted 6.19.0-rc3+ #2 NONE\n[ 0.905157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.17.0-0-gb52ca86e094d-prebuilt.qemu.org 04/01/2014\n[ 0.905754] RIP: 0010:qfq_deactivate_agg (include/linux/list.h:992 (discriminator 2) include/linux/list.h:1006 (discriminator 2) net/sched/sch_qfq.c:1367 (discriminator 2) net/sched/sch_qfq.c:1393 (discriminator 2))\n[ 0.906046] Code: 0f 84 4d 01 00 00 48 89 70 18 8b 4b 10 48 c7 c2 ff ff ff ff 48 8b 78 08 48 d3 e2 48 21 f2 48 2b 13 48 8b 30 48 d3 ea 8b 4b 18 0\n\nCode starting with the faulting instruction\n===========================================\n 0:\t0f 84 4d 01 00 00 \tje 0x153\n 6:\t48 89 70 18 \tmov %rsi,0x18(%rax)\n a:\t8b 4b 10 \tmov 0x10(%rbx),%ecx\n d:\t48 c7 c2 ff ff ff ff \tmov $0xffffffffffffffff,%rdx\n 14:\t48 8b 78 08 \tmov 0x8(%rax),%rdi\n 18:\t48 d3 e2 \tshl %cl,%rdx\n 1b:\t48 21 f2 \tand %rsi,%rdx\n 1e:\t48 2b 13 \tsub (%rbx),%rdx\n 21:\t48 8b 30 \tmov (%rax),%rsi\n 24:\t48 d3 ea \tshr %cl,%rdx\n 27:\t8b 4b 18 \tmov 0x18(%rbx),%ecx\n\t...\n[ 0.907095] RSP: 0018:ffffc900004a39a0 EFLAGS: 00010246\n[ 0.907368] RAX: ffff8881043a0880 RBX: ffff888102953340 RCX: 0000000000000000\n[ 0.907723] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n[ 0.908100] RBP: ffff888102952180 R08: 0000000000000000 R09: 0000000000000000\n[ 0.908451] R10: ffff8881043a0000 R11: 0000000000000000 R12: ffff888102952000\n[ 0.908804] R13: ffff888102952180 R14: ffff8881043a0ad8 R15: ffff8881043a0880\n[ 0.909179] FS: 000000002a1a0380(0000) GS:ffff888196d8d000(0000) knlGS:0000000000000000\n[ 0.909572] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 0.909857] CR2: 0000000000000000 CR3: 0000000102993002 CR4: 0000000000772ef0\n[ 0.910247] PKRU: 55555554\n[ 0.910391] Call Trace:\n[ 0.910527] \u003cTASK\u003e\n[ 0.910638] qfq_reset_qdisc (net/sched/sch_qfq.c:357 net/sched/sch_qfq.c:1485)\n[ 0.910826] qdisc_reset (include/linux/skbuff.h:2195 include/linux/skbuff.h:2501 include/linux/skbuff.h:3424 include/linux/skbuff.h:3430 net/sched/sch_generic.c:1036)\n[ 0.911040] __qdisc_destroy (net/sched/sch_generic.c:1076)\n[ 0.911236] tc_new_tfilter (net/sched/cls_api.c:2447)\n[ 0.911447] rtnetlink_rcv_msg (net/core/rtnetlink.c:6958)\n[ 0.911663] ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6861)\n[ 0.911894] netlink_rcv_skb (net/netlink/af_netlink.c:2550)\n[ 0.912100] netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344)\n[ 0.912296] ? __alloc_skb (net/core/skbuff.c:706)\n[ 0.912484] netlink_sendmsg (net/netlink/af\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22976",
"url": "https://www.suse.com/security/cve/CVE-2026-22976"
},
{
"category": "external",
"summary": "SUSE Bug 1257035 for CVE-2026-22976",
"url": "https://bugzilla.suse.com/1257035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2026-22976"
},
{
"cve": "CVE-2026-22978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22978"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: avoid kernel-infoleak from struct iw_point\n\nstruct iw_point has a 32bit hole on 64bit arches.\n\nstruct iw_point {\n void __user *pointer; /* Pointer to the data (in user space) */\n __u16 length; /* number of fields or size in bytes */\n __u16 flags; /* Optional params */\n};\n\nMake sure to zero the structure to avoid disclosing 32bits of kernel data\nto user space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22978",
"url": "https://www.suse.com/security/cve/CVE-2026-22978"
},
{
"category": "external",
"summary": "SUSE Bug 1257227 for CVE-2026-22978",
"url": "https://bugzilla.suse.com/1257227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2026-22978"
},
{
"cve": "CVE-2026-22988",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22988"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narp: do not assume dev_hard_header() does not change skb-\u003ehead\n\narp_create() is the only dev_hard_header() caller\nmaking assumption about skb-\u003ehead being unchanged.\n\nA recent commit broke this assumption.\n\nInitialize @arp pointer after dev_hard_header() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22988",
"url": "https://www.suse.com/security/cve/CVE-2026-22988"
},
{
"category": "external",
"summary": "SUSE Bug 1257282 for CVE-2026-22988",
"url": "https://bugzilla.suse.com/1257282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2026-22988"
},
{
"cve": "CVE-2026-22999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22999"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: do not free existing class in qfq_change_class()\n\nFixes qfq_change_class() error case.\n\ncl-\u003eqdisc and cl should only be freed if a new class and qdisc\nwere allocated, or we risk various UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22999",
"url": "https://www.suse.com/security/cve/CVE-2026-22999"
},
{
"category": "external",
"summary": "SUSE Bug 1257236 for CVE-2026-22999",
"url": "https://bugzilla.suse.com/1257236"
},
{
"category": "external",
"summary": "SUSE Bug 1257238 for CVE-2026-22999",
"url": "https://bugzilla.suse.com/1257238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "important"
}
],
"title": "CVE-2026-22999"
},
{
"cve": "CVE-2026-23001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: fix possible UAF in macvlan_forward_source()\n\nAdd RCU protection on (struct macvlan_source_entry)-\u003evlan.\n\nWhenever macvlan_hash_del_source() is called, we must clear\nentry-\u003evlan pointer before RCU grace period starts.\n\nThis allows macvlan_forward_source() to skip over\nentries queued for freeing.\n\nNote that macvlan_dev are already RCU protected, as they\nare embedded in a standard netdev (netdev_priv(ndev)).\n\nhttps: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23001",
"url": "https://www.suse.com/security/cve/CVE-2026-23001"
},
{
"category": "external",
"summary": "SUSE Bug 1257232 for CVE-2026-23001",
"url": "https://bugzilla.suse.com/1257232"
},
{
"category": "external",
"summary": "SUSE Bug 1257233 for CVE-2026-23001",
"url": "https://bugzilla.suse.com/1257233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "important"
}
],
"title": "CVE-2026-23001"
},
{
"cve": "CVE-2026-23011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23011"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: ip_gre: make ipgre_header() robust\n\nAnalog to commit db5b4e39c4e6 (\"ip6_gre: make ip6gre_header() robust\")\n\nOver the years, syzbot found many ways to crash the kernel\nin ipgre_header() [1].\n\nThis involves team or bonding drivers ability to dynamically\nchange their dev-\u003eneeded_headroom and/or dev-\u003ehard_header_len\n\nIn this particular crash mld_newpack() allocated an skb\nwith a too small reserve/headroom, and by the time mld_sendpack()\nwas called, syzbot managed to attach an ipgre device.\n\n[1]\nskbuff: skb_under_panic: text:ffffffff89ea3cb7 len:2030915468 put:2030915372 head:ffff888058b43000 data:ffff887fdfa6e194 tail:0x120 end:0x6c0 dev:team0\n kernel BUG at net/core/skbuff.c:213 !\nOops: invalid opcode: 0000 [#1] SMP KASAN PTI\nCPU: 1 UID: 0 PID: 1322 Comm: kworker/1:9 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nWorkqueue: mld mld_ifc_work\n RIP: 0010:skb_panic+0x157/0x160 net/core/skbuff.c:213\nCall Trace:\n \u003cTASK\u003e\n skb_under_panic net/core/skbuff.c:223 [inline]\n skb_push+0xc3/0xe0 net/core/skbuff.c:2641\n ipgre_header+0x67/0x290 net/ipv4/ip_gre.c:897\n dev_hard_header include/linux/netdevice.h:3436 [inline]\n neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618\n NF_HOOK_COND include/linux/netfilter.h:307 [inline]\n ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247\n NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318\n mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855\n mld_send_cr net/ipv6/mcast.c:2154 [inline]\n mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23011",
"url": "https://www.suse.com/security/cve/CVE-2026-23011"
},
{
"category": "external",
"summary": "SUSE Bug 1257207 for CVE-2026-23011",
"url": "https://bugzilla.suse.com/1257207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_293-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.293.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.293.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.293.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-12T11:26:33Z",
"details": "moderate"
}
],
"title": "CVE-2026-23011"
}
]
}
SUSE-SU-2025:4393-1
Vulnerability from csaf_suse - Published: 2025-12-15 11:09 - Updated: 2025-12-15 11:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP7 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076).\n- CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n\nThe following non security issues were fixed:\n\n- ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).\n- ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).\n- ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).\n- ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-fixes).\n- ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).\n- ACPI: property: Return present device nodes only on fwnode interface (stable-fixes).\n- ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes).\n- ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes).\n- ALSA: serial-generic: remove shared static buffer (stable-fixes).\n- ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).\n- ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes).\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-fixes).\n- ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).\n- ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).\n- ALSA: usb-audio: don\u0027t log messages meant for 1810c when initializing 1824c (git-fixes).\n- ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).\n- ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).\n- ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-fixes).\n- ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).\n- ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes).\n- ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).\n- ASoC: tas2781: fix getting the wrong device number (git-fixes).\n- ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-fixes).\n- Bluetooth: 6lowpan: Don\u0027t hold spin lock over sleeping functions (git-fixes).\n- Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).\n- Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes).\n- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).\n- Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).\n- Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() (git-fixes).\n- Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).\n- Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).\n- Bluetooth: bcsp: receive data only if registered (stable-fixes).\n- Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).\n- Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes).\n- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-fixes).\n- Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).\n- Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).\n- HID: amd_sfh: Stop sensor before starting (git-fixes).\n- HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).\n- HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).\n- HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).\n- HID: uclogic: Fix potential memory leak in error path (git-fixes).\n- Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).\n- Input: imx_sc_key - fix memory corruption on unload (git-fixes).\n- Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).\n- KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).\n- KVM: SEV: Enforce minimum GHCB version requirement for SEV-SNP guests (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes).\n- KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).\n- KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-fixes).\n- KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-fixes).\n- KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes).\n- KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).\n- KVM: VMX: Preserve host\u0027s DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes).\n- KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-fixes).\n- KVM: nVMX: Check vmcs12-\u003eguest_ia32_debugctl on nested VM-Enter (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes).\n- KVM: x86: Add helper to retrieve current value of user return MSR (git-fixes).\n- KVM: x86: Convert vcpu_run()\u0027s immediate exit param into a generic bitmap (git-fixes).\n- KVM: x86: Don\u0027t treat ENTER and LEAVE as branches, because they aren\u0027t (git-fixes).\n- KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-fixes).\n- KVM: x86: Have all vendor neutral sub-configs depend on KVM_X86, not just KVM (git-fixes).\n- NFS4: Fix state renewals missing after boot (git-fixes).\n- NFS: check if suid/sgid was cleared after a write as needed (git-fixes).\n- NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).\n- NFSD: Skip close replay processing if XDR encoding fails (git-fixes).\n- NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).\n- NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).\n- NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).\n- PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).\n- PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).\n- PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).\n- PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes).\n- PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-fixes).\n- PCI: j721e: Fix incorrect error message in probe() (git-fixes).\n- PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-fixes).\n- PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).\n- RDMA/bnxt_re: Don\u0027t fail destroy QP and cleanup debugfs earlier (git-fixes).\n- RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes).\n- RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).\n- RDMA/hns: Fix the modification of max_send_sge (git-fixes).\n- RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).\n- RDMA/irdma: Fix SD index calculation (git-fixes).\n- RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes).\n- accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).\n- accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes).\n- accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes).\n- accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes).\n- acpi,srat: Fix incorrect device handle check for Generic Initiator (git-fixes).\n- acpi/hmat: Fix lockdep warning for hmem_register_resource() (git-fixes).\n- amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).\n- ata: libata-scsi: Add missing scsi_device_put() in ata_scsi_dev_rescan() (git-fixes).\n- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes).\n- block: fix kobject double initialization in add_disk (git-fixes).\n- bpf: Fix test verif_scale_strobemeta_subprogs failure due to llvm19 (bsc#1252368).\n- bpf: improve error message for unsupported helper (bsc#1252370).\n- btrfs: abort transaction on failure to add link to inode (git-fixes).\n- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-fix).\n- btrfs: avoid using fixed char array size for tree names (git-fix).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- btrfs: fix COW handling in run_delalloc_nocow() (git-fix).\n- btrfs: fix inode leak on failure to add link to inode (git-fixes).\n- btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).\n- btrfs: mark dirty extent range for out of bound prealloc extents (git-fixes).\n- btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).\n- btrfs: rename err to ret in btrfs_link() (git-fixes).\n- btrfs: run btrfs_error_commit_super() early (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fix).\n- btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-fixes).\n- btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).\n- btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes).\n- btrfs: simplify error handling logic for btrfs_link() (git-fixes).\n- btrfs: tree-checker: add dev extent item checks (git-fix).\n- btrfs: tree-checker: add type and sequence check for inline backrefs (git-fix).\n- btrfs: tree-checker: fix the wrong output of data backref objectid (git-fix).\n- btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).\n- btrfs: tree-checker: validate dref root and objectid (git-fix).\n- btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes).\n- cgroup/cpuset: Remove remote_partition_check() \u0026 make update_cpumasks_hier() handle remote partition (bsc#1241166).\n- char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes).\n- char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes).\n- char: misc: restrict the dynamic range to exclude reserved minors (stable-fixes).\n- cpuset: Use new excpus for nocpu error check when enabling root partition (bsc#1241166).\n- cpuset: fix failure to enable isolated partition when containing isolcpus (bsc#1241166).\n- cramfs: Verify inode mode when loading from disk (git-fixes).\n- crypto: aspeed - fix double free caused by devm (git-fixes).\n- crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes).\n- crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-fixes).\n- crypto: iaa - Do not clobber req-\u003ebase.data (git-fixes).\n- crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).\n- dmaengine: dw-edma: Set status for callback_result (stable-fixes).\n- dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).\n- drm/amd/amdgpu: Release xcp drm memory after unplug (stable-fixes).\n- drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with DC_FP_START (stable-fixes).\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: Add fallback path for YCBCR422 (stable-fixes).\n- drm/amd/display: Allow VRR params change if unsynced with the stream (git-fixes).\n- drm/amd/display: Disable VRR on DCE 6 (stable-fixes).\n- drm/amd/display: Enable mst when it\u0027s detected but yet to be initialized (git-fixes).\n- drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).\n- drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).\n- drm/amd/display: Fix black screen with HDMI outputs (git-fixes).\n- drm/amd/display: Fix for test crash due to power gating (stable-fixes).\n- drm/amd/display: Fix incorrect return of vblank enable on unconfigured crtc (stable-fixes).\n- drm/amd/display: Fix pbn_div Calculation Error (stable-fixes).\n- drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-fixes).\n- drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting (stable-fixes).\n- drm/amd/display: Init dispclk from bootup clock for DCN314 (stable-fixes).\n- drm/amd/display: Move setup_stream_attribute (stable-fixes).\n- drm/amd/display: Reject modes with too high pixel clock on DCE6-10 (git-fixes).\n- drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off (stable-fixes).\n- drm/amd/display: Set up pixel encoding for YCBCR422 (stable-fixes).\n- drm/amd/display: Support HW cursor 180 rot for any number of pipe splits (stable-fixes).\n- drm/amd/display: Wait until OTG enable state is cleared (stable-fixes).\n- drm/amd/display: add more cyan skillfish devices (stable-fixes).\n- drm/amd/display: change dc stream color settings only in atomic commit (stable-fixes).\n- drm/amd/display: ensure committing streams is seamless (stable-fixes).\n- drm/amd/display: fix condition for setting timing_adjust_pending (stable-fixes).\n- drm/amd/display: fix dml ms order of operations (stable-fixes).\n- drm/amd/display: incorrect conditions for failing dto calculations (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-fixes).\n- drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).\n- drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).\n- drm/amd: Avoid evicting resources at S5 (stable-fixes).\n- drm/amd: Check that VPE has reached DPM0 in idle handler (stable-fixes).\n- drm/amd: Fix suspend failure with secure display TA (git-fixes).\n- drm/amd: add more cyan skillfish PCI ids (stable-fixes).\n- drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() (stable-fixes).\n- drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).\n- drm/amdgpu/smu: Handle S0ix for vangogh (stable-fixes).\n- drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).\n- drm/amdgpu: Check vcn sram load return value (stable-fixes).\n- drm/amdgpu: Correct the counts of nr_banks and nr_errors (stable-fixes).\n- drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes).\n- drm/amdgpu: Fix function header names in amdgpu_connectors.c (git-fixes).\n- drm/amdgpu: Fix unintended error log in VCN5_0_0 (git-fixes).\n- drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2) (stable-fixes).\n- drm/amdgpu: Skip poison aca bank from UE channel (stable-fixes).\n- drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-fixes).\n- drm/amdgpu: add range check for RAS bad page address (stable-fixes).\n- drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).\n- drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM surfaces (stable-fixes).\n- drm/amdgpu: don\u0027t enable SMU on cyan skillfish (stable-fixes).\n- drm/amdgpu: fix nullptr err of vm_handle_moved (stable-fixes).\n- drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM (stable-fixes).\n- drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).\n- drm/amdgpu: remove two invalid BUG_ON()s (stable-fixes).\n- drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).\n- drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).\n- drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).\n- drm/amdkfd: relax checks for over allocation of save area (stable-fixes).\n- drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).\n- drm/ast: Blank with VGACR17 sync enable, always clear VGACRB6 sync off (git-fixes).\n- drm/bridge: cdns-dsi: Don\u0027t fail on MIPI_DSI_MODE_VIDEO_BURST (stable-fixes).\n- drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).\n- drm/bridge: display-connector: don\u0027t set OP_DETECT for DisplayPorts (stable-fixes).\n- drm/exynos: exynos7_drm_decon: remove ctx-\u003esuspended (git-fixes).\n- drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes).\n- drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-fixes).\n- drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).\n- drm/mediatek: Add pm_runtime support for GCE power control (git-fixes).\n- drm/mediatek: Disable AFBC support on Mediatek DRM driver (git-fixes).\n- drm/msm/a6xx: Fix PDC sleep sequence (git-fixes).\n- drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-fixes).\n- drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).\n- drm/msm/registers: Generate _HI/LO builders for reg64 (stable-fixes).\n- drm/msm: make sure to not queue up recovery more than once (stable-fixes).\n- drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes).\n- drm/panthor: Serialize GPU cache flush operations (stable-fixes).\n- drm/panthor: check bo offset alignment in vm bind (stable-fixes).\n- drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).\n- drm/sched: Optimise drm_sched_entity_push_job (stable-fixes).\n- drm/sched: avoid killing parent entity on child SIGKILL (stable-fixes).\n- drm/tegra: Add call to put_pid() (git-fixes).\n- drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).\n- drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-fixes).\n- drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-fixes).\n- drm/xe/guc: Add more GuC load error status codes (stable-fixes).\n- drm/xe/guc: Increase GuC crash dump buffer size (stable-fixes).\n- drm/xe/guc: Return an error code if the GuC load fails (stable-fixes).\n- drm/xe/guc: Set upper limit of H2G retries over CTB (stable-fixes).\n- drm/xe/guc: Synchronize Dead CT worker with unbind (git-fixes).\n- drm/xe: Do clean shutdown also when using flr (git-fixes).\n- drm/xe: Do not wake device during a GT reset (git-fixes).\n- drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test (stable-fixes).\n- drm/xe: Move declarations under conditional branch (stable-fixes).\n- drm/xe: Remove duplicate DRM_EXEC selection from Kconfig (git-fixes).\n- drm: panel-backlight-quirks: Make EDID match optional (stable-fixes).\n- exfat: limit log print for IO error (git-fixes).\n- extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).\n- extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).\n- fbcon: Set fb_display[i]-\u003emode to NULL when the mode is released (stable-fixes).\n- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes).\n- fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).\n- fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-fixes).\n- hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-fixes).\n- hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).\n- hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).\n- hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes).\n- hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-fixes).\n- hwmon: sy7636a: add alias (stable-fixes).\n- hyperv: Remove the spurious null directive line (git-fixes).\n- iio: adc: imx93_adc: load calibrated values even calibration failed (stable-fixes).\n- iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes).\n- ima: don\u0027t clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes).\n- iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-fixes).\n- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).\n- ixgbe: fix memory leak and use-after-free in ixgbe_recovery_probe() (git-fixes).\n- jfs: Verify inode mode when loading from disk (git-fixes).\n- jfs: fix uninitialized waitqueue in transaction manager (git-fixes).\n- lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes).\n- md/raid1: fix data lost for writemostly rdev (git-fixes).\n- md: fix mssing blktrace bio split events (git-fixes).\n- media: adv7180: Add missing lock in suspend callback (stable-fixes).\n- media: adv7180: Do not write format to device in set_fmt (stable-fixes).\n- media: adv7180: Only validate format in querystd (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- media: fix uninitialized symbol warnings (stable-fixes).\n- media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes).\n- media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes).\n- media: imon: make send_packet() more robust (stable-fixes).\n- media: ov08x40: Fix the horizontal flip control (stable-fixes).\n- media: redrat3: use int type to store negative error codes (stable-fixes).\n- media: uvcvideo: Use heuristic to find stream entity (git-fixes).\n- media: videobuf2: forbid remove_bufs when legacy fileio is active (git-fixes).\n- memstick: Add timeout to prevent indefinite waiting (stable-fixes).\n- mfd: da9063: Split chip variant reading in two bus transactions (stable-fixes).\n- mfd: madera: Work around false-positive -Wininitialized warning (stable-fixes).\n- mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).\n- mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).\n- minixfs: Verify inode mode when loading from disk (git-fixes).\n- mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-fixes).\n- mm/secretmem: fix use-after-free race in fault handler (git-fixes).\n- mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).\n- mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).\n- mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).\n- mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).\n- mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).\n- mtdchar: fix integer overflow in read/write ioctls (git-fixes).\n- net/mana: fix warning in the writer of client oob (git-fixes).\n- net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779).\n- net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).\n- net: phy: clear link parameters on admin link down (stable-fixes).\n- net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-fixes).\n- net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).\n- net: tcp: send zero-window ACK when no memory (bsc#1253779).\n- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-fixes).\n- nfs4_setup_readdir(): insufficient locking for -\u003ed_parent-\u003ed_inode dereferencing (git-fixes).\n- nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).\n- nvme-auth: add hkdf_expand_label() (bsc#1247683).\n- nvme-auth: use hkdf_expand_label() (bsc#1247683).\n- phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).\n- phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes).\n- phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes).\n- pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).\n- pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-fixes).\n- pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-fixes).\n- platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes).\n- power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).\n- power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes).\n- power: supply: sbs-charger: Support multiple devices (stable-fixes).\n- powerpc: export MIN RMA size (bsc#1236743 ltc#211409).\n- powerpc: increase MIN RMA size for CAS negotiation (bsc#1236743 ltc#211409 bsc#1252269 ltc#215957).\n- regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).\n- rtc: rx8025: fix incorrect register reference (git-fixes).\n- s390/mm,fault: simplify kfence fault handling (bsc#1247076).\n- scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-fixes).\n- scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).\n- scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).\n- scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-fixes).\n- scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).\n- scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).\n- scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).\n- scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).\n- scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-fixes).\n- scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).\n- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).\n- selftests/bpf: Check for timeout in perf_link test (bsc#1253648).\n- selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).\n- selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).\n- selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).\n- selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).\n- selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).\n- selftests/bpf: Fix string read in strncmp benchmark (git-fixes).\n- selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-fixes).\n- selftests/bpf: Remove sockmap_ktls disconnect_after_delete test (bsc#1252365).\n- selftests/bpf: Remove tests for zeroed-array kptr (bsc#1252366).\n- selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).\n- selftests/bpf: fix signedness bug in redir_partial() (git-fixes).\n- selftests/net/forwarding: add slowwait functions (bsc#1254235).\n- selftests/net/lib: no need to record ns name if it already exist (bsc#1254235).\n- selftests/net/lib: update busywait timeout value (bsc#1254235).\n- selftests/net: add lib.sh (bsc#1254235).\n- selftests/net: add variable NS_LIST for lib.sh (bsc#1254235).\n- selftests/net: use tc rule to filter the na packet (bsc#1254235).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- selftests: forwarding.config.sample: Move overrides to lib.sh (bsc#1254235).\n- selftests: forwarding: Add a test for testing lib.sh functionality (bsc#1254235).\n- selftests: forwarding: Avoid failures to source net/lib.sh (bsc#1254235).\n- selftests: forwarding: Change inappropriate log_test_skip() calls (bsc#1254235).\n- selftests: forwarding: Convert log_test() to recognize RET values (bsc#1254235).\n- selftests: forwarding: Have RET track kselftest framework constants (bsc#1254235).\n- selftests: forwarding: Parametrize mausezahn delay (bsc#1254235).\n- selftests: forwarding: Redefine relative_path variable (bsc#1254235).\n- selftests: forwarding: Remove duplicated lib.sh content (bsc#1254235).\n- selftests: forwarding: Support for performance sensitive tests (bsc#1254235).\n- selftests: lib: Define more kselftest exit codes (bsc#1254235).\n- selftests: lib: tc_rule_stats_get(): Move default to argument definition (bsc#1254235).\n- selftests: net: List helper scripts in TEST_FILES Makefile variable (bsc#1254235).\n- selftests: net: Unify code of busywait() and slowwait() (bsc#1254235).\n- selftests: net: add helper for checking if nettest is available (bsc#1254235).\n- selftests: net: lib: Do not overwrite error messages (bsc#1254235).\n- selftests: net: lib: Move logging from forwarding/lib.sh here (bsc#1254235).\n- selftests: net: lib: avoid error removing empty netns name (bsc#1254235).\n- selftests: net: lib: do not set ns var as readonly (bsc#1254235).\n- selftests: net: lib: fix shift count out of range (bsc#1254235).\n- selftests: net: lib: ignore possible errors (bsc#1254235).\n- selftests: net: lib: kill PIDs before del netns (bsc#1254235).\n- selftests: net: lib: remove \u0027ns\u0027 var in setup_ns (bsc#1254235).\n- selftests: net: lib: remove ns from list after clean-up (bsc#1254235).\n- selftests: net: lib: set \u0027i\u0027 as local (bsc#1254235).\n- selftests: net: lib: support errexit with busywait (bsc#1254235).\n- selftests: net: libs: Change variable fallback syntax (bsc#1254235).\n- serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes).\n- serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).\n- soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).\n- soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).\n- soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).\n- spi: Try to get ACPI GPIO IRQ earlier (git-fixes).\n- spi: loopback-test: Don\u0027t use %pK through printk (stable-fixes).\n- spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).\n- strparser: Fix signed/unsigned mismatch bug (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).\n- tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-fixes).\n- tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-fixes).\n- tools/hv: fcopy: Fix incorrect file path conversion (git-fixes).\n- tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).\n- tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-fixes).\n- tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).\n- tools: lib: thermal: don\u0027t preserve owner in install (stable-fixes).\n- tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).\n- uio_hv_generic: Query the ringbuffer size for device (git-fixes).\n- usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).\n- usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes).\n- usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-fixes).\n- usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).\n- usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).\n- usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-fixes).\n- usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-fixes).\n- video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-fixes).\n- watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-fixes).\n- wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: ath11k: zero init info-\u003estatus in wmi_process_mgmt_tx_comp() (git-fixes).\n- wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).\n- wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list (stable-fixes).\n- wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in lower bands (stable-fixes).\n- wifi: mac80211: Fix HE capabilities element check (stable-fixes).\n- wifi: mac80211: Track NAN interface start/stop (stable-fixes).\n- wifi: mac80211: don\u0027t mark keys for inactive links as uploaded (stable-fixes).\n- wifi: mac80211: fix key tailroom accounting leak (git-fixes).\n- wifi: mac80211: reject address change while connecting (git-fixes).\n- wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).\n- wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-fixes).\n- wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes).\n- wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).\n- wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error (stable-fixes).\n- wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-fixes).\n- wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes).\n- wifi: rtw89: print just once for unknown C2H events (stable-fixes).\n- wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-fixes).\n- x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).\n- x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).\n- x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).\n- x86/CPU/AMD: Do the common init on future Zens too (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).\n- x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).\n- x86/bugs: Report correct retbleed mitigation status (git-fixes).\n- x86/vmscape: Add old Intel CPUs to affected list (git-fixes).\n- xe/oa: Fix query mode of operation for OAR/OAC (git-fixes).\n- xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).\n- xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes).\n- xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes).\n- xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes).\n- xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4393,SUSE-SLE-Module-Basesystem-15-SP7-2025-4393,SUSE-SLE-Module-Development-Tools-15-SP7-2025-4393,SUSE-SLE-Module-Legacy-15-SP7-2025-4393,SUSE-SLE-Module-Live-Patching-15-SP7-2025-4393,SUSE-SLE-Product-HA-15-SP7-2025-4393,SUSE-SLE-Product-WE-15-SP7-2025-4393",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4393-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4393-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254393-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4393-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1236743",
"url": "https://bugzilla.suse.com/1236743"
},
{
"category": "self",
"summary": "SUSE Bug 1237888",
"url": "https://bugzilla.suse.com/1237888"
},
{
"category": "self",
"summary": "SUSE Bug 1241166",
"url": "https://bugzilla.suse.com/1241166"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1247076",
"url": "https://bugzilla.suse.com/1247076"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1247509",
"url": "https://bugzilla.suse.com/1247509"
},
{
"category": "self",
"summary": "SUSE Bug 1247683",
"url": "https://bugzilla.suse.com/1247683"
},
{
"category": "self",
"summary": "SUSE Bug 1249547",
"url": "https://bugzilla.suse.com/1249547"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251786",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252267",
"url": "https://bugzilla.suse.com/1252267"
},
{
"category": "self",
"summary": "SUSE Bug 1252269",
"url": "https://bugzilla.suse.com/1252269"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252353",
"url": "https://bugzilla.suse.com/1252353"
},
{
"category": "self",
"summary": "SUSE Bug 1252365",
"url": "https://bugzilla.suse.com/1252365"
},
{
"category": "self",
"summary": "SUSE Bug 1252366",
"url": "https://bugzilla.suse.com/1252366"
},
{
"category": "self",
"summary": "SUSE Bug 1252368",
"url": "https://bugzilla.suse.com/1252368"
},
{
"category": "self",
"summary": "SUSE Bug 1252370",
"url": "https://bugzilla.suse.com/1252370"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252773",
"url": "https://bugzilla.suse.com/1252773"
},
{
"category": "self",
"summary": "SUSE Bug 1252774",
"url": "https://bugzilla.suse.com/1252774"
},
{
"category": "self",
"summary": "SUSE Bug 1252780",
"url": "https://bugzilla.suse.com/1252780"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252862",
"url": "https://bugzilla.suse.com/1252862"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253393",
"url": "https://bugzilla.suse.com/1253393"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253648",
"url": "https://bugzilla.suse.com/1253648"
},
{
"category": "self",
"summary": "SUSE Bug 1253779",
"url": "https://bugzilla.suse.com/1253779"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254235",
"url": "https://bugzilla.suse.com/1254235"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53676 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21710 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38359 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39788 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40030 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40040 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40080 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-15T11:09:08Z",
"generator": {
"date": "2025-12-15T11:09:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4393-1",
"initial_release_date": "2025-12-15T11:09:08Z",
"revision_history": [
{
"date": "2025-12-15T11:09:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "cluster-md-kmp-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "dlm-kmp-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "dlm-kmp-default-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-allwinner-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-allwinner-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-altera-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-altera-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-amazon-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-amazon-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-amd-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-amd-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-amlogic-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-amlogic-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-apm-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-apm-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-apple-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-apple-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-arm-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-arm-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-broadcom-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-broadcom-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-cavium-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-cavium-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-exynos-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-exynos-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-freescale-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-freescale-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-hisilicon-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-lg-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-lg-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-marvell-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-marvell-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-mediatek-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-mediatek-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-nvidia-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-nvidia-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-qcom-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-qcom-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-renesas-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-renesas-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-rockchip-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-rockchip-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-socionext-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-socionext-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-sprd-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-sprd-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "dtb-xilinx-6.4.0-150700.53.25.1.aarch64",
"product_id": "dtb-xilinx-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "gfs2-kmp-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-64kb-extra-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-64kb-optional-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-64kb-optional-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-default-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"product_id": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"product_id": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-default-devel-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-default-extra-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-default-optional-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-kvmsmall-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-obs-build-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-obs-qa-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kernel-syms-6.4.0-150700.53.25.1.aarch64",
"product_id": "kernel-syms-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "kselftests-kmp-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "ocfs2-kmp-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-6.4.0-150700.53.25.1.aarch64",
"product_id": "reiserfs-kmp-64kb-6.4.0-150700.53.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-150700.53.25.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-150700.53.25.1.noarch",
"product_id": "kernel-devel-6.4.0-150700.53.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.4.0-150700.53.25.2.noarch",
"product": {
"name": "kernel-docs-6.4.0-150700.53.25.2.noarch",
"product_id": "kernel-docs-6.4.0-150700.53.25.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.4.0-150700.53.25.2.noarch",
"product": {
"name": "kernel-docs-html-6.4.0-150700.53.25.2.noarch",
"product_id": "kernel-docs-html-6.4.0-150700.53.25.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-150700.53.25.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-150700.53.25.1.noarch",
"product_id": "kernel-macros-6.4.0-150700.53.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-150700.53.25.1.noarch",
"product": {
"name": "kernel-source-6.4.0-150700.53.25.1.noarch",
"product_id": "kernel-source-6.4.0-150700.53.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.4.0-150700.53.25.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.4.0-150700.53.25.1.noarch",
"product_id": "kernel-source-vanilla-6.4.0-150700.53.25.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-default-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"product_id": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"product_id": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-default-devel-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-default-extra-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-default-optional-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-kvmsmall-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"product_id": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-obs-build-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-obs-qa-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kernel-syms-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"product_id": "dlm-kmp-default-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-default-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-default-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-default-devel-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-default-extra-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-default-optional-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"product_id": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-obs-build-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-obs-qa-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-syms-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-syms-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"product_id": "kernel-zfcpdump-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.s390x",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "dlm-kmp-default-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"product_id": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"product_id": "kernel-default-base-rebuild-6.4.0-150700.53.25.1.150700.17.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-devel-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-optional-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-default-vdso-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-obs-build-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-obs-qa-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kernel-syms-6.4.0-150700.53.25.1.x86_64",
"product_id": "kernel-syms-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-default-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150700.53.25.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150700.53.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150700.53.25.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150700.53.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150700.53.25.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch"
},
"product_reference": "kernel-docs-6.4.0-150700.53.25.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150700.53.25.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150700.53.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150700.53.25.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
},
"product_reference": "kernel-default-extra-6.4.0-150700.53.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2023-53676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53676"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it\u0027s possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53676",
"url": "https://www.suse.com/security/cve/CVE-2023-53676"
},
{
"category": "external",
"summary": "SUSE Bug 1251786 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251786"
},
{
"category": "external",
"summary": "SUSE Bug 1251787 for CVE-2023-53676",
"url": "https://bugzilla.suse.com/1251787"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2023-53676"
},
{
"cve": "CVE-2025-21710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: correct handling of extreme memory squeeze\n\nTesting with iperf3 using the \"pasta\" protocol splicer has revealed\na problem in the way tcp handles window advertising in extreme memory\nsqueeze situations.\n\nUnder memory pressure, a socket endpoint may temporarily advertise\na zero-sized window, but this is not stored as part of the socket data.\nThe reasoning behind this is that it is considered a temporary setting\nwhich shouldn\u0027t influence any further calculations.\n\nHowever, if we happen to stall at an unfortunate value of the current\nwindow size, the algorithm selecting a new value will consistently fail\nto advertise a non-zero window once we have freed up enough memory.\nThis means that this side\u0027s notion of the current window size is\ndifferent from the one last advertised to the peer, causing the latter\nto not send any data to resolve the sitution.\n\nThe problem occurs on the iperf3 server side, and the socket in question\nis a completely regular socket with the default settings for the\nfedora40 kernel. We do not use SO_PEEK or SO_RCVBUF on the socket.\n\nThe following excerpt of a logging session, with own comments added,\nshows more in detail what is happening:\n\n// tcp_v4_rcv(-\u003e)\n// tcp_rcv_established(-\u003e)\n[5201\u003c-\u003e39222]: ==== Activating log @ net/ipv4/tcp_input.c/tcp_data_queue()/5257 ====\n[5201\u003c-\u003e39222]: tcp_data_queue(-\u003e)\n[5201\u003c-\u003e39222]: DROPPING skb [265600160..265665640], reason: SKB_DROP_REASON_PROTO_MEM\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 259909392-\u003e260034360 (124968), unread 5565800, qlen 85, ofoq 0]\n [OFO queue: gap: 65480, len: 0]\n[5201\u003c-\u003e39222]: tcp_data_queue(\u003c-)\n[5201\u003c-\u003e39222]: __tcp_transmit_skb(-\u003e)\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: tcp_select_window(-\u003e)\n[5201\u003c-\u003e39222]: (inet_csk(sk)-\u003eicsk_ack.pending \u0026 ICSK_ACK_NOMEM) ? --\u003e TRUE\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n returning 0\n[5201\u003c-\u003e39222]: tcp_select_window(\u003c-)\n[5201\u003c-\u003e39222]: ADVERTISING WIN 0, ACK_SEQ: 265600160\n[5201\u003c-\u003e39222]: [__tcp_transmit_skb(\u003c-)\n[5201\u003c-\u003e39222]: tcp_rcv_established(\u003c-)\n[5201\u003c-\u003e39222]: tcp_v4_rcv(\u003c-)\n\n// Receive queue is at 85 buffers and we are out of memory.\n// We drop the incoming buffer, although it is in sequence, and decide\n// to send an advertisement with a window of zero.\n// We don\u0027t update tp-\u003ercv_wnd and tp-\u003ercv_wup accordingly, which means\n// we unconditionally shrink the window.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 0, win_now = 131184, 2 * win_now = 262368]\n[5201\u003c-\u003e39222]: [new_win \u003e= (2 * win_now) ? --\u003e time_to_ack = 0]\n[5201\u003c-\u003e39222]: NOT calling tcp_send_ack()\n [tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160]\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(\u003c-)\n [rcv_nxt 265600160, rcv_wnd 262144, snt_ack 265469200, win_now 131184]\n [copied_seq 260040464-\u003e260040464 (0), unread 5559696, qlen 85, ofoq 0]\n returning 6104 bytes\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(\u003c-)\n\n// After each read, the algorithm for calculating the new receive\n// window in __tcp_cleanup_rbuf() finds it is too small to advertise\n// or to update tp-\u003ercv_wnd.\n// Meanwhile, the peer thinks the window is zero, and will not send\n// any more data to trigger an update from the interrupt mode side.\n\n[5201\u003c-\u003e39222]: tcp_recvmsg_locked(-\u003e)\n[5201\u003c-\u003e39222]: __tcp_cleanup_rbuf(-\u003e) tp-\u003ercv_wup: 265469200, tp-\u003ercv_wnd: 262144, tp-\u003ercv_nxt 265600160\n[5201\u003c-\u003e39222]: [new_win = 262144, win_now = 131184, 2 * win_n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21710",
"url": "https://www.suse.com/security/cve/CVE-2025-21710"
},
{
"category": "external",
"summary": "SUSE Bug 1237888 for CVE-2025-21710",
"url": "https://bugzilla.suse.com/1237888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-21710"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38359"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix in_atomic() handling in do_secure_storage_access()\n\nKernel user spaces accesses to not exported pages in atomic context\nincorrectly try to resolve the page fault.\nWith debug options enabled call traces like this can be seen:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39\npreempt_count: 1, expected: 0\nRCU nest depth: 0, expected: 0\nINFO: lockdep is turned off.\nPreemption disabled at:\n[\u003c00000383ea47cfa2\u003e] copy_page_from_iter_atomic+0xa2/0x8a0\nCPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39\nTainted: G W 6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT\nTainted: [W]=WARN\nHardware name: IBM 3931 A01 703 (LPAR)\nCall Trace:\n [\u003c00000383e990d282\u003e] dump_stack_lvl+0xa2/0xe8\n [\u003c00000383e99bf152\u003e] __might_resched+0x292/0x2d0\n [\u003c00000383eaa7c374\u003e] down_read+0x34/0x2d0\n [\u003c00000383e99432f8\u003e] do_secure_storage_access+0x108/0x360\n [\u003c00000383eaa724b0\u003e] __do_pgm_check+0x130/0x220\n [\u003c00000383eaa842e4\u003e] pgm_check_handler+0x114/0x160\n [\u003c00000383ea47d028\u003e] copy_page_from_iter_atomic+0x128/0x8a0\n([\u003c00000383ea47d016\u003e] copy_page_from_iter_atomic+0x116/0x8a0)\n [\u003c00000383e9c45eae\u003e] generic_perform_write+0x16e/0x310\n [\u003c00000383e9eb87f4\u003e] ext4_buffered_write_iter+0x84/0x160\n [\u003c00000383e9da0de4\u003e] vfs_write+0x1c4/0x460\n [\u003c00000383e9da123c\u003e] ksys_write+0x7c/0x100\n [\u003c00000383eaa7284e\u003e] __do_syscall+0x15e/0x280\n [\u003c00000383eaa8417e\u003e] system_call+0x6e/0x90\nINFO: lockdep is turned off.\n\nIt is not allowed to take the mmap_lock while in atomic context. Therefore\nhandle such a secure storage access fault as if the accessed page is not\nmapped: the uaccess function will return -EFAULT, and the caller has to\ndeal with this. Usually this means that the access is retried in process\ncontext, which allows to resolve the page fault (or in this case export the\npage).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38359",
"url": "https://www.suse.com/security/cve/CVE-2025-38359"
},
{
"category": "external",
"summary": "SUSE Bug 1247076 for CVE-2025-38359",
"url": "https://bugzilla.suse.com/1247076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-39788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39788",
"url": "https://www.suse.com/security/cve/CVE-2025-39788"
},
{
"category": "external",
"summary": "SUSE Bug 1249547 for CVE-2025-39788",
"url": "https://bugzilla.suse.com/1249547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40030",
"url": "https://www.suse.com/security/cve/CVE-2025-40030"
},
{
"category": "external",
"summary": "SUSE Bug 1252773 for CVE-2025-40030",
"url": "https://bugzilla.suse.com/1252773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40030"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40040"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[ 44.607039] ------------[ cut here ]------------\n[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[ 44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[ 44.617726] Call Trace:\n[ 44.617926] \u003cTASK\u003e\n[ 44.619284] userfaultfd_release+0xef/0x1b0\n[ 44.620976] __fput+0x3f9/0xb60\n[ 44.621240] fput_close_sync+0x110/0x210\n[ 44.622222] __x64_sys_close+0x8f/0x120\n[ 44.622530] do_syscall_64+0x5b/0x2f0\n[ 44.622840] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all(). Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide. This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation. This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[ 45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40040",
"url": "https://www.suse.com/security/cve/CVE-2025-40040"
},
{
"category": "external",
"summary": "SUSE Bug 1252780 for CVE-2025-40040",
"url": "https://bugzilla.suse.com/1252780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40040"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40048"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer. So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \"Hey, I\u0027m ready for interrupts\".\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n message in the ring buffer, it doesn\u0027t generate an interrupt.\n This is the correct behavior, because the host should only send an\n interrupt when the inbound ring buffer transitions from empty to\n not-empty. Adding an additional message to a ring buffer that is not\n empty is not supposed to generate an interrupt on the guest.\n Since the guest is waiting in pread() and not removing messages from\n the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40048",
"url": "https://www.suse.com/security/cve/CVE-2025-40048"
},
{
"category": "external",
"summary": "SUSE Bug 1252862 for CVE-2025-40048",
"url": "https://bugzilla.suse.com/1252862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40048"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: restrict sockets to TCP and UDP\n\nRecently, syzbot started to abuse NBD with all kinds of sockets.\n\nCommit cf1b2326b734 (\"nbd: verify socket is supported during setup\")\nmade sure the socket supported a shutdown() method.\n\nExplicitely accept TCP and UNIX stream sockets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40080",
"url": "https://www.suse.com/security/cve/CVE-2025-40080"
},
{
"category": "external",
"summary": "SUSE Bug 1252774 for CVE-2025-40080",
"url": "https://bugzilla.suse.com/1252774"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40080"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.25.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.25.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.25.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-15T11:09:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:20021-1
Vulnerability from csaf_suse - Published: 2025-12-19 16:19 - Updated: 2025-12-19 16:19Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).\n- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths (bsc#1253455).\n- CVE-2025-40203: listmount: don\u0027t call path_put() under namespace semaphore (bsc#1253457).\n\nThe following non security issues were fixed:\n\n- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn\u0027t implement a\n proper watchdog interface and has many code issues. It only handles\n obscure and obsolete hardware. Stop building and supporting this driver\n (jsc#PED-14062).\n- Fix \"drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\" (bsc#1252923)\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).\n- PCI/ERR: Update device error_state already after reset (stable-fixes).\n- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\" (git-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon port speed set\" (git-fixes).\n- Update config files: enable zstd module decompression (jsc#PED-14115).\n- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).\n- btrfs: do not clear read-only when adding sprout device (bsc#1253238).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- mount: handle NULL values in mnt_ns_release() (bsc#1254308)\n- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).\n- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).\n- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).\n- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).\n- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).\n- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).\n- net: phy: realtek: improve mmd register access for internal PHY\u0027s (jsc#PED-14353).\n- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).\n- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).\n- net: phy: realtek: use string choices helpers (jsc#PED-14353).\n- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)\n- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)\n- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)\n- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).\n- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).\n- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: don\u0027t take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).\n- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).\n- sched/fair: Get rid of sched_domains_curr_level hack for tl-\u003ecpumask() (bsc#1246843).\n- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).\n- sched/fair: Proportional newidle balance (bsc#1248792).\n- sched/fair: Proportional newidle balance -KABI (bsc#1248792).\n- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).\n- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).\n- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).\n- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155)\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).\n- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).\n- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).\n- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).\n- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).\n- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).\n- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).\n- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).\n- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).\n- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).\n- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).\n- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).\n- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).\n- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).\n- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).\n- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).\n- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).\n- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-HA-16.0-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20021-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20021-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620021-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20021-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245498",
"url": "https://bugzilla.suse.com/1245498"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1246843",
"url": "https://bugzilla.suse.com/1246843"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248792",
"url": "https://bugzilla.suse.com/1248792"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249397",
"url": "https://bugzilla.suse.com/1249397"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249977",
"url": "https://bugzilla.suse.com/1249977"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250723",
"url": "https://bugzilla.suse.com/1250723"
},
{
"category": "self",
"summary": "SUSE Bug 1250746",
"url": "https://bugzilla.suse.com/1250746"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251817",
"url": "https://bugzilla.suse.com/1251817"
},
{
"category": "self",
"summary": "SUSE Bug 1252054",
"url": "https://bugzilla.suse.com/1252054"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252301",
"url": "https://bugzilla.suse.com/1252301"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252357",
"url": "https://bugzilla.suse.com/1252357"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252779",
"url": "https://bugzilla.suse.com/1252779"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252901",
"url": "https://bugzilla.suse.com/1252901"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253238",
"url": "https://bugzilla.suse.com/1253238"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253328",
"url": "https://bugzilla.suse.com/1253328"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253405",
"url": "https://bugzilla.suse.com/1253405"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253410",
"url": "https://bugzilla.suse.com/1253410"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253422",
"url": "https://bugzilla.suse.com/1253422"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253426",
"url": "https://bugzilla.suse.com/1253426"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253450",
"url": "https://bugzilla.suse.com/1253450"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253457",
"url": "https://bugzilla.suse.com/1253457"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253622",
"url": "https://bugzilla.suse.com/1253622"
},
{
"category": "self",
"summary": "SUSE Bug 1253624",
"url": "https://bugzilla.suse.com/1253624"
},
{
"category": "self",
"summary": "SUSE Bug 1253635",
"url": "https://bugzilla.suse.com/1253635"
},
{
"category": "self",
"summary": "SUSE Bug 1253643",
"url": "https://bugzilla.suse.com/1253643"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254308",
"url": "https://bugzilla.suse.com/1254308"
},
{
"category": "self",
"summary": "SUSE Bug 1254315",
"url": "https://bugzilla.suse.com/1254315"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39831 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39897 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39917 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39961 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39990 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40165 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40203 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-19T16:19:41Z",
"generator": {
"date": "2025-12-19T16:19:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20021-1",
"initial_release_date": "2025-12-19T16:19:41Z",
"revision_history": [
{
"date": "2025-12-19T16:19:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 16.0",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:16.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: unshare page tables during VMA split, not before\n\nCurrently, __split_vma() triggers hugetlb page table unsharing through\nvm_ops-\u003emay_split(). This happens before the VMA lock and rmap locks are\ntaken - which is too early, it allows racing VMA-locked page faults in our\nprocess and racing rmap walks from other processes to cause page tables to\nbe shared again before we actually perform the split.\n\nFix it by explicitly calling into the hugetlb unshare logic from\n__split_vma() in the same place where THP splitting also happens. At that\npoint, both the VMA and the rmap(s) are write-locked.\n\nAn annoying detail is that we can now call into the helper\nhugetlb_unshare_pmds() from two different locking contexts:\n\n1. from hugetlb_split(), holding:\n - mmap lock (exclusively)\n - VMA lock\n - file rmap lock (exclusively)\n2. hugetlb_unshare_all_pmds(), which I think is designed to be able to\n call us with only the mmap lock held (in shared mode), but currently\n only runs while holding mmap lock (exclusively) and VMA lock\n\nBackporting note:\nThis commit fixes a racy protection that was introduced in commit\nb30c14cd6102 (\"hugetlb: unshare some PMDs when splitting VMAs\"); that\ncommit claimed to fix an issue introduced in 5.13, but it should actually\nalso go all the way back.\n\n[jannh@google.com: v2]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38084",
"url": "https://www.suse.com/security/cve/CVE-2025-38084"
},
{
"category": "external",
"summary": "SUSE Bug 1245498 for CVE-2025-38084",
"url": "https://bugzilla.suse.com/1245498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38084"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Log an error when close_all_cached_dirs fails\n\nUnder low-memory conditions, close_all_cached_dirs() can\u0027t move the\ndentries to a separate list to dput() them once the locks are dropped.\nThis will result in a \"Dentry still in use\" error, so add an error\nmessage that makes it clear this is what happened:\n\n[ 495.281119] CIFS: VFS: \\\\otters.example.com\\share Out of memory while dropping dentries\n[ 495.281595] ------------[ cut here ]------------\n[ 495.281887] BUG: Dentry ffff888115531138{i=78,n=/} still in use (2) [unmount of cifs cifs]\n[ 495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0\n\nAlso, bail out of looping through all tcons as soon as a single\nallocation fails, since we\u0027re already in trouble, and kmalloc() attempts\nfor subseqeuent tcons are likely to fail just like the first one did.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38321",
"url": "https://www.suse.com/security/cve/CVE-2025-38321"
},
{
"category": "external",
"summary": "SUSE Bug 1246328 for CVE-2025-38321",
"url": "https://bugzilla.suse.com/1246328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbnic: Move phylink resume out of service_task and into open/close\n\nThe fbnic driver was presenting with the following locking assert coming\nout of a PM resume:\n[ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)\n[ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0\n[ 42.208872][ T164] Modules linked in:\n[ 42.209140][ T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)\n[ 42.209496][ T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 42.209861][ T164] RIP: 0010:phylink_resume+0x190/0x1e0\n[ 42.210057][ T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 \u003c0f\u003e 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef\n[ 42.210708][ T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296\n[ 42.210983][ T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000\n[ 42.211235][ T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001\n[ 42.211466][ T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84\n[ 42.211707][ T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000\n[ 42.211997][ T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0\n[ 42.212234][ T164] FS: 00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000\n[ 42.212505][ T164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 42.212704][ T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0\n[ 42.213227][ T164] PKRU: 55555554\n[ 42.213366][ T164] Call Trace:\n[ 42.213483][ T164] \u003cTASK\u003e\n[ 42.213565][ T164] __fbnic_pm_attach.isra.0+0x8e/0xa0\n[ 42.213725][ T164] pci_reset_function+0x116/0x1d0\n[ 42.213895][ T164] reset_store+0xa0/0x100\n[ 42.214025][ T164] ? pci_dev_reset_attr_is_visible+0x50/0x50\n[ 42.214221][ T164] ? sysfs_file_kobj+0xc1/0x1e0\n[ 42.214374][ T164] ? sysfs_kf_write+0x65/0x160\n[ 42.214526][ T164] kernfs_fop_write_iter+0x2f8/0x4c0\n[ 42.214677][ T164] ? kernfs_vma_page_mkwrite+0x1f0/0x1f0\n[ 42.214836][ T164] new_sync_write+0x308/0x6f0\n[ 42.214987][ T164] ? __lock_acquire+0x34c/0x740\n[ 42.215135][ T164] ? new_sync_read+0x6f0/0x6f0\n[ 42.215288][ T164] ? lock_acquire.part.0+0xbc/0x260\n[ 42.215440][ T164] ? ksys_write+0xff/0x200\n[ 42.215590][ T164] ? perf_trace_sched_switch+0x6d0/0x6d0\n[ 42.215742][ T164] vfs_write+0x65e/0xbb0\n[ 42.215876][ T164] ksys_write+0xff/0x200\n[ 42.215994][ T164] ? __ia32_sys_read+0xc0/0xc0\n[ 42.216141][ T164] ? do_user_addr_fault+0x269/0x9f0\n[ 42.216292][ T164] ? rcu_is_watching+0x15/0xd0\n[ 42.216442][ T164] do_syscall_64+0xbb/0x360\n[ 42.216591][ T164] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[ 42.216784][ T164] RIP: 0033:0x7f0dc8ea9986\n\nA bit of digging showed that we were invoking the phylink_resume as a part\nof the fbnic_up path when we were enabling the service task while not\nholding the RTNL lock. We should be enabling this sooner as a part of the\nndo_open path and then just letting the service task come online later.\nThis will help to enforce the correct locking and brings the phylink\ninterface online at the same time as the network interface, instead of at a\nlater time.\n\nI tested this on QEMU to verify this was working by putting the system to\nsleep using \"echo mem \u003e /sys/power/state\" to put the system to sleep in the\nguest and then using the command \"system_wakeup\" in the QEMU monitor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39831",
"url": "https://www.suse.com/security/cve/CVE-2025-39831"
},
{
"category": "external",
"summary": "SUSE Bug 1249977 for CVE-2025-39831",
"url": "https://bugzilla.suse.com/1249977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39897"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: xilinx: axienet: Add error handling for RX metadata pointer retrieval\n\nAdd proper error checking for dmaengine_desc_get_metadata_ptr() which\ncan return an error pointer and lead to potential crashes or undefined\nbehaviour if the pointer retrieval fails.\n\nProperly handle the error by unmapping DMA buffer, freeing the skb and\nreturning early to prevent further processing with invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39897",
"url": "https://www.suse.com/security/cve/CVE-2025-39897"
},
{
"category": "external",
"summary": "SUSE Bug 1250746 for CVE-2025-39897",
"url": "https://bugzilla.suse.com/1250746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39897"
},
{
"cve": "CVE-2025-39917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt\n\nStanislav reported that in bpf_crypto_crypt() the destination dynptr\u0027s\nsize is not validated to be at least as large as the source dynptr\u0027s\nsize before calling into the crypto backend with \u0027len = src_len\u0027. This\ncan result in an OOB write when the destination is smaller than the\nsource.\n\nConcretely, in mentioned function, psrc and pdst are both linear\nbuffers fetched from each dynptr:\n\n psrc = __bpf_dynptr_data(src, src_len);\n [...]\n pdst = __bpf_dynptr_data_rw(dst, dst_len);\n [...]\n err = decrypt ?\n ctx-\u003etype-\u003edecrypt(ctx-\u003etfm, psrc, pdst, src_len, piv) :\n ctx-\u003etype-\u003eencrypt(ctx-\u003etfm, psrc, pdst, src_len, piv);\n\nThe crypto backend expects pdst to be large enough with a src_len length\nthat can be written. Add an additional src_len \u003e dst_len check and bail\nout if it\u0027s the case. Note that these kfuncs are accessible under root\nprivileges only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39917",
"url": "https://www.suse.com/security/cve/CVE-2025-39917"
},
{
"category": "external",
"summary": "SUSE Bug 1250723 for CVE-2025-39917",
"url": "https://bugzilla.suse.com/1250723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39917"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39961"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd/pgtbl: Fix possible race while increase page table level\n\nThe AMD IOMMU host page table implementation supports dynamic page table levels\n(up to 6 levels), starting with a 3-level configuration that expands based on\nIOVA address. The kernel maintains a root pointer and current page table level\nto enable proper page table walks in alloc_pte()/fetch_pte() operations.\n\nThe IOMMU IOVA allocator initially starts with 32-bit address and onces its\nexhuasted it switches to 64-bit address (max address is determined based\non IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU\ndriver increases page table level.\n\nBut in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads\npgtable-\u003e[root/mode] without lock. So its possible that in exteme corner case,\nwhen increase_address_space() is updating pgtable-\u003e[root/mode], fetch_pte()\nreads wrong page table level (pgtable-\u003emode). It does compare the value with\nlevel encoded in page table and returns NULL. This will result is\niommu_unmap ops to fail and upper layer may retry/log WARN_ON.\n\nCPU 0 CPU 1\n------ ------\nmap pages unmap pages\nalloc_pte() -\u003e increase_address_space() iommu_v1_unmap_pages() -\u003e fetch_pte()\n pgtable-\u003eroot = pte (new root value)\n READ pgtable-\u003e[mode/root]\n\t\t\t\t\t Reads new root, old mode\n Updates mode (pgtable-\u003emode += 1)\n\nSince Page table level updates are infrequent and already synchronized with a\nspinlock, implement seqcount to enable lock-free read operations on the read path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39961",
"url": "https://www.suse.com/security/cve/CVE-2025-39961"
},
{
"category": "external",
"summary": "SUSE Bug 1251817 for CVE-2025-39961",
"url": "https://bugzilla.suse.com/1251817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39961"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-39990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check the helper function is valid in get_helper_proto\n\nkernel test robot reported verifier bug [1] where the helper func\npointer could be NULL due to disabled config option.\n\nAs Alexei suggested we could check on that in get_helper_proto\ndirectly. Marking tail_call helper func with BPF_PTR_POISON,\nbecause it is unused by design.\n\n [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39990",
"url": "https://www.suse.com/security/cve/CVE-2025-39990"
},
{
"category": "external",
"summary": "SUSE Bug 1252054 for CVE-2025-39990",
"url": "https://bugzilla.suse.com/1252054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39990"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: Take a reference on the task in struct vhost_task.\n\nvhost_task_create() creates a task and keeps a reference to its\ntask_struct. That task may exit early via a signal and its task_struct\nwill be released.\nA pending vhost_task_wake() will then attempt to wake the task and\naccess a task_struct which is no longer there.\n\nAcquire a reference on the task_struct while creating the thread and\nrelease the reference while the struct vhost_task itself is removed.\nIf the task exits early due to a signal, then the vhost_task_wake() will\nstill access a valid task_struct. The wake is safe and will be skipped\nin this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40024",
"url": "https://www.suse.com/security/cve/CVE-2025-40024"
},
{
"category": "external",
"summary": "SUSE Bug 1252686 for CVE-2025-40024",
"url": "https://bugzilla.suse.com/1252686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40024"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().\n\nmptcp_active_enable() is called from subflow_finish_connect(),\nwhich is icsk-\u003eicsk_af_ops-\u003esk_rx_dst_set() and it\u0027s not always\nunder RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40133",
"url": "https://www.suse.com/security/cve/CVE-2025-40133"
},
{
"category": "external",
"summary": "SUSE Bug 1253328 for CVE-2025-40133",
"url": "https://bugzilla.suse.com/1253328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix NULL pointer dereference in __dm_suspend()\n\nThere is a race condition between dm device suspend and table load that\ncan lead to null pointer dereference. The issue occurs when suspend is\ninvoked before table load completes:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000054\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\nRIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50\nCall Trace:\n \u003cTASK\u003e\n blk_mq_quiesce_queue+0x2c/0x50\n dm_stop_queue+0xd/0x20\n __dm_suspend+0x130/0x330\n dm_suspend+0x11a/0x180\n dev_suspend+0x27e/0x560\n ctl_ioctl+0x4cf/0x850\n dm_ctl_ioctl+0xd/0x20\n vfs_ioctl+0x1d/0x50\n __se_sys_ioctl+0x9b/0xc0\n __x64_sys_ioctl+0x19/0x30\n x64_sys_call+0x2c4a/0x4620\n do_syscall_64+0x9e/0x1b0\n\nThe issue can be triggered as below:\n\nT1 \t\t\t\t\t\tT2\ndm_suspend\t\t\t\t\ttable_load\n__dm_suspend\t\t\t\t\tdm_setup_md_queue\n\t\t\t\t\t\tdm_mq_init_request_queue\n\t\t\t\t\t\tblk_mq_init_allocated_queue\n\t\t\t\t\t\t=\u003e q-\u003emq_ops = set-\u003eops; (1)\ndm_stop_queue / dm_wait_for_completion\n=\u003e q-\u003etag_set NULL pointer!\t(2)\n\t\t\t\t\t\t=\u003e q-\u003etag_set = set; (3)\n\nFix this by checking if a valid table (map) exists before performing\nrequest-based suspend and waiting for target I/O. When map is NULL,\nskip these table-dependent suspend steps.\n\nEven when map is NULL, no I/O can reach any target because there is\nno table loaded; I/O submitted in this state will fail early in the\nDM layer. Skipping the table-dependent suspend logic in this case\nis safe and avoids NULL pointer dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40134",
"url": "https://www.suse.com/security/cve/CVE-2025-40134"
},
{
"category": "external",
"summary": "SUSE Bug 1253386 for CVE-2025-40134",
"url": "https://bugzilla.suse.com/1253386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix SGI cleanup on unbind\n\nThe driver incorrectly determines SGI vs SPI interrupts by checking IRQ\nnumber \u003c 16, which fails with dynamic IRQ allocation. During unbind,\nthis causes improper SGI cleanup leading to kernel crash.\n\nAdd explicit irq_type field to pdata for reliable identification of SGI\ninterrupts (type-2) and only clean up SGI resources when appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40161",
"url": "https://www.suse.com/security/cve/CVE-2025-40161"
},
{
"category": "external",
"summary": "SUSE Bug 1253410 for CVE-2025-40161",
"url": "https://bugzilla.suse.com/1253410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus-\u003edai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40162",
"url": "https://www.suse.com/security/cve/CVE-2025-40162"
},
{
"category": "external",
"summary": "SUSE Bug 1253422 for CVE-2025-40162",
"url": "https://bugzilla.suse.com/1253422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40165"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nxp: imx8-isi: m2m: Fix streaming cleanup on release\n\nIf streamon/streamoff calls are imbalanced, such as when exiting an\napplication with Ctrl+C when streaming, the m2m usage_count will never\nreach zero and the ISI channel won\u0027t be freed. Besides from that, if the\ninput line width is more than 2K, it will trigger a WARN_ON():\n\n[ 59.222120] ------------[ cut here ]------------\n[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654\n[ 59.238569] Modules linked in: ap1302\n[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT\n[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)\n[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120\n[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120\n[ 59.275047] sp : ffff8000848c3b40\n[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00\n[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001\n[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780\n[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000\n[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c\n[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30\n[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420\n[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000\n[ 59.349590] Call trace:\n[ 59.352025] mxc_isi_channel_chain+0xa4/0x120 (P)\n[ 59.356722] mxc_isi_m2m_streamon+0x160/0x20c\n[ 59.361072] v4l_streamon+0x24/0x30\n[ 59.364556] __video_do_ioctl+0x40c/0x4a0\n[ 59.368560] video_usercopy+0x2bc/0x690\n[ 59.372382] video_ioctl2+0x18/0x24\n[ 59.375857] v4l2_ioctl+0x40/0x60\n[ 59.379168] __arm64_sys_ioctl+0xac/0x104\n[ 59.383172] invoke_syscall+0x48/0x104\n[ 59.386916] el0_svc_common.constprop.0+0xc0/0xe0\n[ 59.391613] do_el0_svc+0x1c/0x28\n[ 59.394915] el0_svc+0x34/0xf4\n[ 59.397966] el0t_64_sync_handler+0xa0/0xe4\n[ 59.402143] el0t_64_sync+0x198/0x19c\n[ 59.405801] ---[ end trace 0000000000000000 ]---\n\nAddress this issue by moving the streaming preparation and cleanup to\nthe vb2 .prepare_streaming() and .unprepare_streaming() operations. This\nalso simplifies the driver by allowing direct usage of the\nv4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40165",
"url": "https://www.suse.com/security/cve/CVE-2025-40165"
},
{
"category": "external",
"summary": "SUSE Bug 1253405 for CVE-2025-40165",
"url": "https://bugzilla.suse.com/1253405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40175"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: cleanup remaining SKBs in PTP flows\n\nWhen the driver requests Tx timestamp value, one of the first steps is\nto clone SKB using skb_get. It increases the reference counter for that\nSKB to prevent unexpected freeing by another component.\nHowever, there may be a case where the index is requested, SKB is\nassigned and never consumed by PTP flows - for example due to reset during\nrunning PTP apps.\n\nAdd a check in release timestamping function to verify if the SKB\nassigned to Tx timestamp latch was freed, and release remaining SKBs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40175",
"url": "https://www.suse.com/security/cve/CVE-2025-40175"
},
{
"category": "external",
"summary": "SUSE Bug 1253426 for CVE-2025-40175",
"url": "https://bugzilla.suse.com/1253426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()\n\nIf new_asoc-\u003epeer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0\nand sctp_ulpevent_make_authkey() returns 0, then the variable\nai_ev remains zero and the zero will be dereferenced\nin the sctp_ulpevent_free() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40187",
"url": "https://www.suse.com/security/cve/CVE-2025-40187"
},
{
"category": "external",
"summary": "SUSE Bug 1253647 for CVE-2025-40187",
"url": "https://bugzilla.suse.com/1253647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"ipmi: fix msg stack when IPMI is disconnected\"\n\nThis reverts commit c608966f3f9c2dca596967501d00753282b395fc.\n\nThis patch has a subtle bug that can cause the IPMI driver to go into an\ninfinite loop if the BMC misbehaves in a certain way. Apparently\ncertain BMCs do misbehave this way because several reports have come in\nrecently about this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40192",
"url": "https://www.suse.com/security/cve/CVE-2025-40192"
},
{
"category": "external",
"summary": "SUSE Bug 1253622 for CVE-2025-40192",
"url": "https://bugzilla.suse.com/1253622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: quota: create dedicated workqueue for quota_release_work\n\nThere is a kernel panic due to WARN_ONCE when panic_on_warn is set.\n\nThis issue occurs when writeback is triggered due to sync call for an\nopened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance\nis needed at sync path, flush for quota_release_work is triggered.\nBy default quota_release_work is queued to \"events_unbound\" queue which\ndoes not have WQ_MEM_RECLAIM flag. During f2fs balance \"writeback\"\nworkqueue tries to flush quota_release_work causing kernel panic due to\nMEM_RECLAIM flag mismatch errors.\n\nThis patch creates dedicated workqueue with WQ_MEM_RECLAIM flag\nfor work quota_release_work.\n\n------------[ cut here ]------------\nWARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148\nCall trace:\n check_flush_dependency+0x13c/0x148\n __flush_work+0xd0/0x398\n flush_delayed_work+0x44/0x5c\n dquot_writeback_dquots+0x54/0x318\n f2fs_do_quota_sync+0xb8/0x1a8\n f2fs_write_checkpoint+0x3cc/0x99c\n f2fs_gc+0x190/0x750\n f2fs_balance_fs+0x110/0x168\n f2fs_write_single_data_page+0x474/0x7dc\n f2fs_write_data_pages+0x7d0/0xd0c\n do_writepages+0xe0/0x2f4\n __writeback_single_inode+0x44/0x4ac\n writeback_sb_inodes+0x30c/0x538\n wb_writeback+0xf4/0x440\n wb_workfn+0x128/0x5d4\n process_scheduled_works+0x1c4/0x45c\n worker_thread+0x32c/0x3e8\n kthread+0x11c/0x1b0\n ret_from_fork+0x10/0x20\nKernel panic - not syncing: kernel: panic_on_warn set ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40196",
"url": "https://www.suse.com/security/cve/CVE-2025-40196"
},
{
"category": "external",
"summary": "SUSE Bug 1253624 for CVE-2025-40196",
"url": "https://bugzilla.suse.com/1253624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Clear minor number before put device\n\nThe device minor should not be cleared after the device is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40197",
"url": "https://www.suse.com/security/cve/CVE-2025-40197"
},
{
"category": "external",
"summary": "SUSE Bug 1253450 for CVE-2025-40197",
"url": "https://bugzilla.suse.com/1253450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40203"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlistmount: don\u0027t call path_put() under namespace semaphore\n\nMassage listmount() and make sure we don\u0027t call path_put() under the\nnamespace semaphore. If we put the last reference we\u0027re fscked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40203",
"url": "https://www.suse.com/security/cve/CVE-2025-40203"
},
{
"category": "external",
"summary": "SUSE Bug 1253457 for CVE-2025-40203",
"url": "https://bugzilla.suse.com/1253457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:20012-1
Vulnerability from csaf_suse - Published: 2025-12-19 16:46 - Updated: 2025-12-19 16:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).\n- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths (bsc#1253455).\n- CVE-2025-40203: listmount: don\u0027t call path_put() under namespace semaphore (bsc#1253457).\n\nThe following non security issues were fixed:\n\n- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn\u0027t implement a\n proper watchdog interface and has many code issues. It only handles\n obscure and obsolete hardware. Stop building and supporting this driver\n (jsc#PED-14062).\n- Fix \"drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\" (bsc#1252923)\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).\n- PCI/ERR: Update device error_state already after reset (stable-fixes).\n- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\" (git-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon port speed set\" (git-fixes).\n- Update config files: enable zstd module decompression (jsc#PED-14115).\n- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).\n- btrfs: do not clear read-only when adding sprout device (bsc#1253238).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- mount: handle NULL values in mnt_ns_release() (bsc#1254308)\n- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).\n- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).\n- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).\n- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).\n- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).\n- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).\n- net: phy: realtek: improve mmd register access for internal PHY\u0027s (jsc#PED-14353).\n- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).\n- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).\n- net: phy: realtek: use string choices helpers (jsc#PED-14353).\n- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)\n- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)\n- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)\n- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).\n- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).\n- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: don\u0027t take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).\n- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).\n- sched/fair: Get rid of sched_domains_curr_level hack for tl-\u003ecpumask() (bsc#1246843).\n- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).\n- sched/fair: Proportional newidle balance (bsc#1248792).\n- sched/fair: Proportional newidle balance -KABI (bsc#1248792).\n- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).\n- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).\n- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).\n- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155)\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).\n- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).\n- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).\n- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).\n- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).\n- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).\n- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).\n- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).\n- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).\n- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).\n- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).\n- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).\n- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).\n- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).\n- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).\n- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).\n- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).\n- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SL-Micro-6.2-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20012-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20012-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620012-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20012-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245498",
"url": "https://bugzilla.suse.com/1245498"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1246843",
"url": "https://bugzilla.suse.com/1246843"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248792",
"url": "https://bugzilla.suse.com/1248792"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249397",
"url": "https://bugzilla.suse.com/1249397"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249977",
"url": "https://bugzilla.suse.com/1249977"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250723",
"url": "https://bugzilla.suse.com/1250723"
},
{
"category": "self",
"summary": "SUSE Bug 1250746",
"url": "https://bugzilla.suse.com/1250746"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251817",
"url": "https://bugzilla.suse.com/1251817"
},
{
"category": "self",
"summary": "SUSE Bug 1252054",
"url": "https://bugzilla.suse.com/1252054"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252301",
"url": "https://bugzilla.suse.com/1252301"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252357",
"url": "https://bugzilla.suse.com/1252357"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252779",
"url": "https://bugzilla.suse.com/1252779"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252901",
"url": "https://bugzilla.suse.com/1252901"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253238",
"url": "https://bugzilla.suse.com/1253238"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253328",
"url": "https://bugzilla.suse.com/1253328"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253405",
"url": "https://bugzilla.suse.com/1253405"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253410",
"url": "https://bugzilla.suse.com/1253410"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253422",
"url": "https://bugzilla.suse.com/1253422"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253426",
"url": "https://bugzilla.suse.com/1253426"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253450",
"url": "https://bugzilla.suse.com/1253450"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253457",
"url": "https://bugzilla.suse.com/1253457"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253622",
"url": "https://bugzilla.suse.com/1253622"
},
{
"category": "self",
"summary": "SUSE Bug 1253624",
"url": "https://bugzilla.suse.com/1253624"
},
{
"category": "self",
"summary": "SUSE Bug 1253635",
"url": "https://bugzilla.suse.com/1253635"
},
{
"category": "self",
"summary": "SUSE Bug 1253643",
"url": "https://bugzilla.suse.com/1253643"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254308",
"url": "https://bugzilla.suse.com/1254308"
},
{
"category": "self",
"summary": "SUSE Bug 1254315",
"url": "https://bugzilla.suse.com/1254315"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39831 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39897 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39917 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39961 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39990 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40165 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40203 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-19T16:46:47Z",
"generator": {
"date": "2025-12-19T16:46:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20012-1",
"initial_release_date": "2025-12-19T16:46:47Z",
"revision_history": [
{
"date": "2025-12-19T16:46:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-devel-6.12.0-160000.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product_id": "kernel-devel-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product_id": "kernel-macros-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-6.12.0-160000.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:transactional"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.8.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: unshare page tables during VMA split, not before\n\nCurrently, __split_vma() triggers hugetlb page table unsharing through\nvm_ops-\u003emay_split(). This happens before the VMA lock and rmap locks are\ntaken - which is too early, it allows racing VMA-locked page faults in our\nprocess and racing rmap walks from other processes to cause page tables to\nbe shared again before we actually perform the split.\n\nFix it by explicitly calling into the hugetlb unshare logic from\n__split_vma() in the same place where THP splitting also happens. At that\npoint, both the VMA and the rmap(s) are write-locked.\n\nAn annoying detail is that we can now call into the helper\nhugetlb_unshare_pmds() from two different locking contexts:\n\n1. from hugetlb_split(), holding:\n - mmap lock (exclusively)\n - VMA lock\n - file rmap lock (exclusively)\n2. hugetlb_unshare_all_pmds(), which I think is designed to be able to\n call us with only the mmap lock held (in shared mode), but currently\n only runs while holding mmap lock (exclusively) and VMA lock\n\nBackporting note:\nThis commit fixes a racy protection that was introduced in commit\nb30c14cd6102 (\"hugetlb: unshare some PMDs when splitting VMAs\"); that\ncommit claimed to fix an issue introduced in 5.13, but it should actually\nalso go all the way back.\n\n[jannh@google.com: v2]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38084",
"url": "https://www.suse.com/security/cve/CVE-2025-38084"
},
{
"category": "external",
"summary": "SUSE Bug 1245498 for CVE-2025-38084",
"url": "https://bugzilla.suse.com/1245498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38084"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Log an error when close_all_cached_dirs fails\n\nUnder low-memory conditions, close_all_cached_dirs() can\u0027t move the\ndentries to a separate list to dput() them once the locks are dropped.\nThis will result in a \"Dentry still in use\" error, so add an error\nmessage that makes it clear this is what happened:\n\n[ 495.281119] CIFS: VFS: \\\\otters.example.com\\share Out of memory while dropping dentries\n[ 495.281595] ------------[ cut here ]------------\n[ 495.281887] BUG: Dentry ffff888115531138{i=78,n=/} still in use (2) [unmount of cifs cifs]\n[ 495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0\n\nAlso, bail out of looping through all tcons as soon as a single\nallocation fails, since we\u0027re already in trouble, and kmalloc() attempts\nfor subseqeuent tcons are likely to fail just like the first one did.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38321",
"url": "https://www.suse.com/security/cve/CVE-2025-38321"
},
{
"category": "external",
"summary": "SUSE Bug 1246328 for CVE-2025-38321",
"url": "https://bugzilla.suse.com/1246328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbnic: Move phylink resume out of service_task and into open/close\n\nThe fbnic driver was presenting with the following locking assert coming\nout of a PM resume:\n[ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)\n[ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0\n[ 42.208872][ T164] Modules linked in:\n[ 42.209140][ T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)\n[ 42.209496][ T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 42.209861][ T164] RIP: 0010:phylink_resume+0x190/0x1e0\n[ 42.210057][ T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 \u003c0f\u003e 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef\n[ 42.210708][ T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296\n[ 42.210983][ T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000\n[ 42.211235][ T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001\n[ 42.211466][ T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84\n[ 42.211707][ T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000\n[ 42.211997][ T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0\n[ 42.212234][ T164] FS: 00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000\n[ 42.212505][ T164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 42.212704][ T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0\n[ 42.213227][ T164] PKRU: 55555554\n[ 42.213366][ T164] Call Trace:\n[ 42.213483][ T164] \u003cTASK\u003e\n[ 42.213565][ T164] __fbnic_pm_attach.isra.0+0x8e/0xa0\n[ 42.213725][ T164] pci_reset_function+0x116/0x1d0\n[ 42.213895][ T164] reset_store+0xa0/0x100\n[ 42.214025][ T164] ? pci_dev_reset_attr_is_visible+0x50/0x50\n[ 42.214221][ T164] ? sysfs_file_kobj+0xc1/0x1e0\n[ 42.214374][ T164] ? sysfs_kf_write+0x65/0x160\n[ 42.214526][ T164] kernfs_fop_write_iter+0x2f8/0x4c0\n[ 42.214677][ T164] ? kernfs_vma_page_mkwrite+0x1f0/0x1f0\n[ 42.214836][ T164] new_sync_write+0x308/0x6f0\n[ 42.214987][ T164] ? __lock_acquire+0x34c/0x740\n[ 42.215135][ T164] ? new_sync_read+0x6f0/0x6f0\n[ 42.215288][ T164] ? lock_acquire.part.0+0xbc/0x260\n[ 42.215440][ T164] ? ksys_write+0xff/0x200\n[ 42.215590][ T164] ? perf_trace_sched_switch+0x6d0/0x6d0\n[ 42.215742][ T164] vfs_write+0x65e/0xbb0\n[ 42.215876][ T164] ksys_write+0xff/0x200\n[ 42.215994][ T164] ? __ia32_sys_read+0xc0/0xc0\n[ 42.216141][ T164] ? do_user_addr_fault+0x269/0x9f0\n[ 42.216292][ T164] ? rcu_is_watching+0x15/0xd0\n[ 42.216442][ T164] do_syscall_64+0xbb/0x360\n[ 42.216591][ T164] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[ 42.216784][ T164] RIP: 0033:0x7f0dc8ea9986\n\nA bit of digging showed that we were invoking the phylink_resume as a part\nof the fbnic_up path when we were enabling the service task while not\nholding the RTNL lock. We should be enabling this sooner as a part of the\nndo_open path and then just letting the service task come online later.\nThis will help to enforce the correct locking and brings the phylink\ninterface online at the same time as the network interface, instead of at a\nlater time.\n\nI tested this on QEMU to verify this was working by putting the system to\nsleep using \"echo mem \u003e /sys/power/state\" to put the system to sleep in the\nguest and then using the command \"system_wakeup\" in the QEMU monitor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39831",
"url": "https://www.suse.com/security/cve/CVE-2025-39831"
},
{
"category": "external",
"summary": "SUSE Bug 1249977 for CVE-2025-39831",
"url": "https://bugzilla.suse.com/1249977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39897"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: xilinx: axienet: Add error handling for RX metadata pointer retrieval\n\nAdd proper error checking for dmaengine_desc_get_metadata_ptr() which\ncan return an error pointer and lead to potential crashes or undefined\nbehaviour if the pointer retrieval fails.\n\nProperly handle the error by unmapping DMA buffer, freeing the skb and\nreturning early to prevent further processing with invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39897",
"url": "https://www.suse.com/security/cve/CVE-2025-39897"
},
{
"category": "external",
"summary": "SUSE Bug 1250746 for CVE-2025-39897",
"url": "https://bugzilla.suse.com/1250746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39897"
},
{
"cve": "CVE-2025-39917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt\n\nStanislav reported that in bpf_crypto_crypt() the destination dynptr\u0027s\nsize is not validated to be at least as large as the source dynptr\u0027s\nsize before calling into the crypto backend with \u0027len = src_len\u0027. This\ncan result in an OOB write when the destination is smaller than the\nsource.\n\nConcretely, in mentioned function, psrc and pdst are both linear\nbuffers fetched from each dynptr:\n\n psrc = __bpf_dynptr_data(src, src_len);\n [...]\n pdst = __bpf_dynptr_data_rw(dst, dst_len);\n [...]\n err = decrypt ?\n ctx-\u003etype-\u003edecrypt(ctx-\u003etfm, psrc, pdst, src_len, piv) :\n ctx-\u003etype-\u003eencrypt(ctx-\u003etfm, psrc, pdst, src_len, piv);\n\nThe crypto backend expects pdst to be large enough with a src_len length\nthat can be written. Add an additional src_len \u003e dst_len check and bail\nout if it\u0027s the case. Note that these kfuncs are accessible under root\nprivileges only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39917",
"url": "https://www.suse.com/security/cve/CVE-2025-39917"
},
{
"category": "external",
"summary": "SUSE Bug 1250723 for CVE-2025-39917",
"url": "https://bugzilla.suse.com/1250723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39917"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39961"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd/pgtbl: Fix possible race while increase page table level\n\nThe AMD IOMMU host page table implementation supports dynamic page table levels\n(up to 6 levels), starting with a 3-level configuration that expands based on\nIOVA address. The kernel maintains a root pointer and current page table level\nto enable proper page table walks in alloc_pte()/fetch_pte() operations.\n\nThe IOMMU IOVA allocator initially starts with 32-bit address and onces its\nexhuasted it switches to 64-bit address (max address is determined based\non IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU\ndriver increases page table level.\n\nBut in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads\npgtable-\u003e[root/mode] without lock. So its possible that in exteme corner case,\nwhen increase_address_space() is updating pgtable-\u003e[root/mode], fetch_pte()\nreads wrong page table level (pgtable-\u003emode). It does compare the value with\nlevel encoded in page table and returns NULL. This will result is\niommu_unmap ops to fail and upper layer may retry/log WARN_ON.\n\nCPU 0 CPU 1\n------ ------\nmap pages unmap pages\nalloc_pte() -\u003e increase_address_space() iommu_v1_unmap_pages() -\u003e fetch_pte()\n pgtable-\u003eroot = pte (new root value)\n READ pgtable-\u003e[mode/root]\n\t\t\t\t\t Reads new root, old mode\n Updates mode (pgtable-\u003emode += 1)\n\nSince Page table level updates are infrequent and already synchronized with a\nspinlock, implement seqcount to enable lock-free read operations on the read path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39961",
"url": "https://www.suse.com/security/cve/CVE-2025-39961"
},
{
"category": "external",
"summary": "SUSE Bug 1251817 for CVE-2025-39961",
"url": "https://bugzilla.suse.com/1251817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39961"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-39990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check the helper function is valid in get_helper_proto\n\nkernel test robot reported verifier bug [1] where the helper func\npointer could be NULL due to disabled config option.\n\nAs Alexei suggested we could check on that in get_helper_proto\ndirectly. Marking tail_call helper func with BPF_PTR_POISON,\nbecause it is unused by design.\n\n [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39990",
"url": "https://www.suse.com/security/cve/CVE-2025-39990"
},
{
"category": "external",
"summary": "SUSE Bug 1252054 for CVE-2025-39990",
"url": "https://bugzilla.suse.com/1252054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39990"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: Take a reference on the task in struct vhost_task.\n\nvhost_task_create() creates a task and keeps a reference to its\ntask_struct. That task may exit early via a signal and its task_struct\nwill be released.\nA pending vhost_task_wake() will then attempt to wake the task and\naccess a task_struct which is no longer there.\n\nAcquire a reference on the task_struct while creating the thread and\nrelease the reference while the struct vhost_task itself is removed.\nIf the task exits early due to a signal, then the vhost_task_wake() will\nstill access a valid task_struct. The wake is safe and will be skipped\nin this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40024",
"url": "https://www.suse.com/security/cve/CVE-2025-40024"
},
{
"category": "external",
"summary": "SUSE Bug 1252686 for CVE-2025-40024",
"url": "https://bugzilla.suse.com/1252686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40024"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().\n\nmptcp_active_enable() is called from subflow_finish_connect(),\nwhich is icsk-\u003eicsk_af_ops-\u003esk_rx_dst_set() and it\u0027s not always\nunder RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40133",
"url": "https://www.suse.com/security/cve/CVE-2025-40133"
},
{
"category": "external",
"summary": "SUSE Bug 1253328 for CVE-2025-40133",
"url": "https://bugzilla.suse.com/1253328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix NULL pointer dereference in __dm_suspend()\n\nThere is a race condition between dm device suspend and table load that\ncan lead to null pointer dereference. The issue occurs when suspend is\ninvoked before table load completes:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000054\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\nRIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50\nCall Trace:\n \u003cTASK\u003e\n blk_mq_quiesce_queue+0x2c/0x50\n dm_stop_queue+0xd/0x20\n __dm_suspend+0x130/0x330\n dm_suspend+0x11a/0x180\n dev_suspend+0x27e/0x560\n ctl_ioctl+0x4cf/0x850\n dm_ctl_ioctl+0xd/0x20\n vfs_ioctl+0x1d/0x50\n __se_sys_ioctl+0x9b/0xc0\n __x64_sys_ioctl+0x19/0x30\n x64_sys_call+0x2c4a/0x4620\n do_syscall_64+0x9e/0x1b0\n\nThe issue can be triggered as below:\n\nT1 \t\t\t\t\t\tT2\ndm_suspend\t\t\t\t\ttable_load\n__dm_suspend\t\t\t\t\tdm_setup_md_queue\n\t\t\t\t\t\tdm_mq_init_request_queue\n\t\t\t\t\t\tblk_mq_init_allocated_queue\n\t\t\t\t\t\t=\u003e q-\u003emq_ops = set-\u003eops; (1)\ndm_stop_queue / dm_wait_for_completion\n=\u003e q-\u003etag_set NULL pointer!\t(2)\n\t\t\t\t\t\t=\u003e q-\u003etag_set = set; (3)\n\nFix this by checking if a valid table (map) exists before performing\nrequest-based suspend and waiting for target I/O. When map is NULL,\nskip these table-dependent suspend steps.\n\nEven when map is NULL, no I/O can reach any target because there is\nno table loaded; I/O submitted in this state will fail early in the\nDM layer. Skipping the table-dependent suspend logic in this case\nis safe and avoids NULL pointer dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40134",
"url": "https://www.suse.com/security/cve/CVE-2025-40134"
},
{
"category": "external",
"summary": "SUSE Bug 1253386 for CVE-2025-40134",
"url": "https://bugzilla.suse.com/1253386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix SGI cleanup on unbind\n\nThe driver incorrectly determines SGI vs SPI interrupts by checking IRQ\nnumber \u003c 16, which fails with dynamic IRQ allocation. During unbind,\nthis causes improper SGI cleanup leading to kernel crash.\n\nAdd explicit irq_type field to pdata for reliable identification of SGI\ninterrupts (type-2) and only clean up SGI resources when appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40161",
"url": "https://www.suse.com/security/cve/CVE-2025-40161"
},
{
"category": "external",
"summary": "SUSE Bug 1253410 for CVE-2025-40161",
"url": "https://bugzilla.suse.com/1253410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus-\u003edai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40162",
"url": "https://www.suse.com/security/cve/CVE-2025-40162"
},
{
"category": "external",
"summary": "SUSE Bug 1253422 for CVE-2025-40162",
"url": "https://bugzilla.suse.com/1253422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40165"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nxp: imx8-isi: m2m: Fix streaming cleanup on release\n\nIf streamon/streamoff calls are imbalanced, such as when exiting an\napplication with Ctrl+C when streaming, the m2m usage_count will never\nreach zero and the ISI channel won\u0027t be freed. Besides from that, if the\ninput line width is more than 2K, it will trigger a WARN_ON():\n\n[ 59.222120] ------------[ cut here ]------------\n[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654\n[ 59.238569] Modules linked in: ap1302\n[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT\n[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)\n[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120\n[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120\n[ 59.275047] sp : ffff8000848c3b40\n[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00\n[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001\n[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780\n[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000\n[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c\n[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30\n[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420\n[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000\n[ 59.349590] Call trace:\n[ 59.352025] mxc_isi_channel_chain+0xa4/0x120 (P)\n[ 59.356722] mxc_isi_m2m_streamon+0x160/0x20c\n[ 59.361072] v4l_streamon+0x24/0x30\n[ 59.364556] __video_do_ioctl+0x40c/0x4a0\n[ 59.368560] video_usercopy+0x2bc/0x690\n[ 59.372382] video_ioctl2+0x18/0x24\n[ 59.375857] v4l2_ioctl+0x40/0x60\n[ 59.379168] __arm64_sys_ioctl+0xac/0x104\n[ 59.383172] invoke_syscall+0x48/0x104\n[ 59.386916] el0_svc_common.constprop.0+0xc0/0xe0\n[ 59.391613] do_el0_svc+0x1c/0x28\n[ 59.394915] el0_svc+0x34/0xf4\n[ 59.397966] el0t_64_sync_handler+0xa0/0xe4\n[ 59.402143] el0t_64_sync+0x198/0x19c\n[ 59.405801] ---[ end trace 0000000000000000 ]---\n\nAddress this issue by moving the streaming preparation and cleanup to\nthe vb2 .prepare_streaming() and .unprepare_streaming() operations. This\nalso simplifies the driver by allowing direct usage of the\nv4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40165",
"url": "https://www.suse.com/security/cve/CVE-2025-40165"
},
{
"category": "external",
"summary": "SUSE Bug 1253405 for CVE-2025-40165",
"url": "https://bugzilla.suse.com/1253405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40175"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: cleanup remaining SKBs in PTP flows\n\nWhen the driver requests Tx timestamp value, one of the first steps is\nto clone SKB using skb_get. It increases the reference counter for that\nSKB to prevent unexpected freeing by another component.\nHowever, there may be a case where the index is requested, SKB is\nassigned and never consumed by PTP flows - for example due to reset during\nrunning PTP apps.\n\nAdd a check in release timestamping function to verify if the SKB\nassigned to Tx timestamp latch was freed, and release remaining SKBs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40175",
"url": "https://www.suse.com/security/cve/CVE-2025-40175"
},
{
"category": "external",
"summary": "SUSE Bug 1253426 for CVE-2025-40175",
"url": "https://bugzilla.suse.com/1253426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()\n\nIf new_asoc-\u003epeer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0\nand sctp_ulpevent_make_authkey() returns 0, then the variable\nai_ev remains zero and the zero will be dereferenced\nin the sctp_ulpevent_free() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40187",
"url": "https://www.suse.com/security/cve/CVE-2025-40187"
},
{
"category": "external",
"summary": "SUSE Bug 1253647 for CVE-2025-40187",
"url": "https://bugzilla.suse.com/1253647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"ipmi: fix msg stack when IPMI is disconnected\"\n\nThis reverts commit c608966f3f9c2dca596967501d00753282b395fc.\n\nThis patch has a subtle bug that can cause the IPMI driver to go into an\ninfinite loop if the BMC misbehaves in a certain way. Apparently\ncertain BMCs do misbehave this way because several reports have come in\nrecently about this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40192",
"url": "https://www.suse.com/security/cve/CVE-2025-40192"
},
{
"category": "external",
"summary": "SUSE Bug 1253622 for CVE-2025-40192",
"url": "https://bugzilla.suse.com/1253622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: quota: create dedicated workqueue for quota_release_work\n\nThere is a kernel panic due to WARN_ONCE when panic_on_warn is set.\n\nThis issue occurs when writeback is triggered due to sync call for an\nopened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance\nis needed at sync path, flush for quota_release_work is triggered.\nBy default quota_release_work is queued to \"events_unbound\" queue which\ndoes not have WQ_MEM_RECLAIM flag. During f2fs balance \"writeback\"\nworkqueue tries to flush quota_release_work causing kernel panic due to\nMEM_RECLAIM flag mismatch errors.\n\nThis patch creates dedicated workqueue with WQ_MEM_RECLAIM flag\nfor work quota_release_work.\n\n------------[ cut here ]------------\nWARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148\nCall trace:\n check_flush_dependency+0x13c/0x148\n __flush_work+0xd0/0x398\n flush_delayed_work+0x44/0x5c\n dquot_writeback_dquots+0x54/0x318\n f2fs_do_quota_sync+0xb8/0x1a8\n f2fs_write_checkpoint+0x3cc/0x99c\n f2fs_gc+0x190/0x750\n f2fs_balance_fs+0x110/0x168\n f2fs_write_single_data_page+0x474/0x7dc\n f2fs_write_data_pages+0x7d0/0xd0c\n do_writepages+0xe0/0x2f4\n __writeback_single_inode+0x44/0x4ac\n writeback_sb_inodes+0x30c/0x538\n wb_writeback+0xf4/0x440\n wb_workfn+0x128/0x5d4\n process_scheduled_works+0x1c4/0x45c\n worker_thread+0x32c/0x3e8\n kthread+0x11c/0x1b0\n ret_from_fork+0x10/0x20\nKernel panic - not syncing: kernel: panic_on_warn set ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40196",
"url": "https://www.suse.com/security/cve/CVE-2025-40196"
},
{
"category": "external",
"summary": "SUSE Bug 1253624 for CVE-2025-40196",
"url": "https://bugzilla.suse.com/1253624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Clear minor number before put device\n\nThe device minor should not be cleared after the device is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40197",
"url": "https://www.suse.com/security/cve/CVE-2025-40197"
},
{
"category": "external",
"summary": "SUSE Bug 1253450 for CVE-2025-40197",
"url": "https://bugzilla.suse.com/1253450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40203"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlistmount: don\u0027t call path_put() under namespace semaphore\n\nMassage listmount() and make sure we don\u0027t call path_put() under the\nnamespace semaphore. If we put the last reference we\u0027re fscked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40203",
"url": "https://www.suse.com/security/cve/CVE-2025-40203"
},
{
"category": "external",
"summary": "SUSE Bug 1253457 for CVE-2025-40203",
"url": "https://bugzilla.suse.com/1253457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
CVE-2025-40198
Vulnerability from fstec - Published: 21.10.2025{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., Canonical Ltd., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7 (Red Hat Enterprise Linux), 16.04 LTS (Ubuntu), 18.04 LTS (Ubuntu), 8 (Red Hat Enterprise Linux), 20.04 LTS (Ubuntu), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 22.04 LTS (Ubuntu), 9 (Red Hat Enterprise Linux), 24.04 LTS (Ubuntu), 25.04 (Ubuntu), 10 (Red Hat Enterprise Linux), 13 (Debian GNU/Linux), 25.10 (Ubuntu), \u0434\u043e 6.18 rc1 (Linux), \u043e\u0442 6.12 \u0434\u043e 6.12.54 (Linux), \u043e\u0442 6.17 \u0434\u043e 6.17.4 (Linux), \u043e\u0442 6.6 \u0434\u043e 6.6.114 (Linux), \u043e\u0442 5.10 \u0434\u043e 5.10.246 (Linux), \u043e\u0442 5.4 \u0434\u043e 5.4.301 (Linux), \u043e\u0442 6.1 \u0434\u043e 6.1.158 (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40198-7a99@gregkh/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2025-40198\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2025-40198\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/CVE-2025-40198",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "21.10.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "24.11.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "24.11.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-14575",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-40198",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Ubuntu, Debian GNU/Linux, Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 7 , Canonical Ltd. Ubuntu 16.04 LTS , Canonical Ltd. Ubuntu 18.04 LTS , Red Hat Inc. Red Hat Enterprise Linux 8 , Canonical Ltd. Ubuntu 20.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , Canonical Ltd. Ubuntu 22.04 LTS , Red Hat Inc. Red Hat Enterprise Linux 9 , Canonical Ltd. Ubuntu 24.04 LTS , Canonical Ltd. Ubuntu 25.04 , Red Hat Inc. Red Hat Enterprise Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 13 , Canonical Ltd. Ubuntu 25.10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 6.18 rc1 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.12 \u0434\u043e 6.12.54 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.17 \u0434\u043e 6.17.4 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.6 \u0434\u043e 6.6.114 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.10 \u0434\u043e 5.10.246 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.4 \u0434\u043e 5.4.301 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.1 \u0434\u043e 6.1.158 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 parse_apply_sb_mount_options() \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0435 null-\u043f\u0440\u0435\u043a\u0440\u0430\u0449\u0435\u043d\u0438\u0435 (CWE-170)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 parse_apply_sb_mount_options() \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043f\u0440\u0438 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u0438 \u0441\u0442\u0440\u043e\u043a\u0438 \u0438\u043b\u0438 \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u0441\u0438\u043c\u0432\u043e\u043b\u043e\u043c NULL. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://git.kernel.org/stable/c/01829af7656b56d83682b3491265d583d502e502\t\nhttps://git.kernel.org/stable/c/2a0cf438320cdb783e0378570744c0ef0d83e934\t\nhttps://git.kernel.org/stable/c/7bf46ff83a0ef11836e38ebd72cdc5107209342d\nhttps://git.kernel.org/stable/c/8ecb790ea8c3fc69e77bace57f14cf0d7c177bd8\nhttps://git.kernel.org/stable/c/a6e94557cd05adc82fae0400f6e17745563e5412\t\nhttps://git.kernel.org/stable/c/b2bac84fde28fb6a88817b8b761abda17a1d300b\nhttps://git.kernel.org/stable/c/e651294218d2684302ee5ed95ccf381646f3e5b4\nhttps://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40198-7a99@gregkh/\nhttps://access.redhat.com/security/cve/cve-2025-40198\nhttps://security-tracker.debian.org/tracker/CVE-2025-40198\nhttps://ubuntu.com/security/CVE-2025-40198",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-170",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,4)"
}
OPENSUSE-SU-2025:20172-1
Vulnerability from csaf_opensuse - Published: 2025-12-19 17:38 - Updated: 2025-12-19 17:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).\n- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths (bsc#1253455).\n- CVE-2025-40203: listmount: don\u0027t call path_put() under namespace semaphore (bsc#1253457).\n\nThe following non security issues were fixed:\n\n- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn\u0027t implement a\n proper watchdog interface and has many code issues. It only handles\n obscure and obsolete hardware. Stop building and supporting this driver\n (jsc#PED-14062).\n- Fix \"drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\" (bsc#1252923)\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).\n- PCI/ERR: Update device error_state already after reset (stable-fixes).\n- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\" (git-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon port speed set\" (git-fixes).\n- Update config files: enable zstd module decompression (jsc#PED-14115).\n- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).\n- btrfs: do not clear read-only when adding sprout device (bsc#1253238).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- mount: handle NULL values in mnt_ns_release() (bsc#1254308)\n- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).\n- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).\n- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).\n- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).\n- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).\n- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).\n- net: phy: realtek: improve mmd register access for internal PHY\u0027s (jsc#PED-14353).\n- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).\n- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).\n- net: phy: realtek: use string choices helpers (jsc#PED-14353).\n- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)\n- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)\n- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)\n- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).\n- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).\n- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: don\u0027t take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).\n- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).\n- sched/fair: Get rid of sched_domains_curr_level hack for tl-\u003ecpumask() (bsc#1246843).\n- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).\n- sched/fair: Proportional newidle balance (bsc#1248792).\n- sched/fair: Proportional newidle balance -KABI (bsc#1248792).\n- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).\n- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).\n- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).\n- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155)\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).\n- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).\n- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).\n- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).\n- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).\n- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).\n- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).\n- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).\n- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).\n- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).\n- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).\n- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).\n- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).\n- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).\n- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).\n- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).\n- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).\n- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_20172-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245498",
"url": "https://bugzilla.suse.com/1245498"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1246843",
"url": "https://bugzilla.suse.com/1246843"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248792",
"url": "https://bugzilla.suse.com/1248792"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249397",
"url": "https://bugzilla.suse.com/1249397"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249977",
"url": "https://bugzilla.suse.com/1249977"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250723",
"url": "https://bugzilla.suse.com/1250723"
},
{
"category": "self",
"summary": "SUSE Bug 1250746",
"url": "https://bugzilla.suse.com/1250746"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251817",
"url": "https://bugzilla.suse.com/1251817"
},
{
"category": "self",
"summary": "SUSE Bug 1252054",
"url": "https://bugzilla.suse.com/1252054"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252301",
"url": "https://bugzilla.suse.com/1252301"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252357",
"url": "https://bugzilla.suse.com/1252357"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252779",
"url": "https://bugzilla.suse.com/1252779"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252901",
"url": "https://bugzilla.suse.com/1252901"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253238",
"url": "https://bugzilla.suse.com/1253238"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253328",
"url": "https://bugzilla.suse.com/1253328"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253405",
"url": "https://bugzilla.suse.com/1253405"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253410",
"url": "https://bugzilla.suse.com/1253410"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253422",
"url": "https://bugzilla.suse.com/1253422"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253426",
"url": "https://bugzilla.suse.com/1253426"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253450",
"url": "https://bugzilla.suse.com/1253450"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253457",
"url": "https://bugzilla.suse.com/1253457"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253622",
"url": "https://bugzilla.suse.com/1253622"
},
{
"category": "self",
"summary": "SUSE Bug 1253624",
"url": "https://bugzilla.suse.com/1253624"
},
{
"category": "self",
"summary": "SUSE Bug 1253635",
"url": "https://bugzilla.suse.com/1253635"
},
{
"category": "self",
"summary": "SUSE Bug 1253643",
"url": "https://bugzilla.suse.com/1253643"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254308",
"url": "https://bugzilla.suse.com/1254308"
},
{
"category": "self",
"summary": "SUSE Bug 1254315",
"url": "https://bugzilla.suse.com/1254315"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39831 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39897 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39917 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39961 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39990 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40165 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40203 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-19T17:38:16Z",
"generator": {
"date": "2025-12-19T17:38:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:20172-1",
"initial_release_date": "2025-12-19T17:38:16Z",
"revision_history": [
{
"date": "2025-12-19T17:38:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-allwinner-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-allwinner-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-altera-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-altera-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-amazon-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-amazon-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-amd-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-amd-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-amlogic-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-amlogic-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-apm-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-apm-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-apple-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-apple-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-arm-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-arm-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-broadcom-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-broadcom-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-cavium-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-cavium-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-exynos-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-exynos-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-freescale-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-freescale-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-hisilicon-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-lg-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-lg-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-marvell-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-marvell-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-mediatek-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-mediatek-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-nvidia-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-nvidia-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-qcom-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-qcom-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-renesas-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-renesas-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-rockchip-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-rockchip-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-socionext-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-socionext-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-sprd-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-sprd-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-xilinx-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-xilinx-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-optional-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-optional-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-obs-build-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-obs-build-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-optional-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-syms-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product_id": "kernel-devel-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch",
"product_id": "kernel-docs-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"product_id": "kernel-docs-html-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product_id": "kernel-macros-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-vanilla-6.12.0-160000.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-optional-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-obs-build-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-syms-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-optional-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-optional-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-obs-build-6.12.0-160000.8.1.s390x",
"product_id": "kernel-obs-build-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x",
"product_id": "kernel-syms-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"product_id": "kernel-zfcpdump-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "kselftests-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-optional-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-optional-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-obs-build-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-obs-build-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-extra-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-optional-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-syms-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-allwinner-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-altera-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amazon-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-amazon-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-amd-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-amlogic-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-apm-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apple-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-apple-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-arm-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-broadcom-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-cavium-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-exynos-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-freescale-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-lg-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-marvell-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-mediatek-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-nvidia-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-qcom-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-renesas-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-rockchip-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-socionext-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-sprd-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-xilinx-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-optional-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-optional-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-optional-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-obs-build-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-obs-build-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-obs-build-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-extra-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-extra-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-optional-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-optional-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: unshare page tables during VMA split, not before\n\nCurrently, __split_vma() triggers hugetlb page table unsharing through\nvm_ops-\u003emay_split(). This happens before the VMA lock and rmap locks are\ntaken - which is too early, it allows racing VMA-locked page faults in our\nprocess and racing rmap walks from other processes to cause page tables to\nbe shared again before we actually perform the split.\n\nFix it by explicitly calling into the hugetlb unshare logic from\n__split_vma() in the same place where THP splitting also happens. At that\npoint, both the VMA and the rmap(s) are write-locked.\n\nAn annoying detail is that we can now call into the helper\nhugetlb_unshare_pmds() from two different locking contexts:\n\n1. from hugetlb_split(), holding:\n - mmap lock (exclusively)\n - VMA lock\n - file rmap lock (exclusively)\n2. hugetlb_unshare_all_pmds(), which I think is designed to be able to\n call us with only the mmap lock held (in shared mode), but currently\n only runs while holding mmap lock (exclusively) and VMA lock\n\nBackporting note:\nThis commit fixes a racy protection that was introduced in commit\nb30c14cd6102 (\"hugetlb: unshare some PMDs when splitting VMAs\"); that\ncommit claimed to fix an issue introduced in 5.13, but it should actually\nalso go all the way back.\n\n[jannh@google.com: v2]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38084",
"url": "https://www.suse.com/security/cve/CVE-2025-38084"
},
{
"category": "external",
"summary": "SUSE Bug 1245498 for CVE-2025-38084",
"url": "https://bugzilla.suse.com/1245498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-38084"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Log an error when close_all_cached_dirs fails\n\nUnder low-memory conditions, close_all_cached_dirs() can\u0027t move the\ndentries to a separate list to dput() them once the locks are dropped.\nThis will result in a \"Dentry still in use\" error, so add an error\nmessage that makes it clear this is what happened:\n\n[ 495.281119] CIFS: VFS: \\\\otters.example.com\\share Out of memory while dropping dentries\n[ 495.281595] ------------[ cut here ]------------\n[ 495.281887] BUG: Dentry ffff888115531138{i=78,n=/} still in use (2) [unmount of cifs cifs]\n[ 495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0\n\nAlso, bail out of looping through all tcons as soon as a single\nallocation fails, since we\u0027re already in trouble, and kmalloc() attempts\nfor subseqeuent tcons are likely to fail just like the first one did.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38321",
"url": "https://www.suse.com/security/cve/CVE-2025-38321"
},
{
"category": "external",
"summary": "SUSE Bug 1246328 for CVE-2025-38321",
"url": "https://bugzilla.suse.com/1246328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbnic: Move phylink resume out of service_task and into open/close\n\nThe fbnic driver was presenting with the following locking assert coming\nout of a PM resume:\n[ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)\n[ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0\n[ 42.208872][ T164] Modules linked in:\n[ 42.209140][ T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)\n[ 42.209496][ T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 42.209861][ T164] RIP: 0010:phylink_resume+0x190/0x1e0\n[ 42.210057][ T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 \u003c0f\u003e 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef\n[ 42.210708][ T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296\n[ 42.210983][ T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000\n[ 42.211235][ T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001\n[ 42.211466][ T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84\n[ 42.211707][ T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000\n[ 42.211997][ T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0\n[ 42.212234][ T164] FS: 00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000\n[ 42.212505][ T164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 42.212704][ T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0\n[ 42.213227][ T164] PKRU: 55555554\n[ 42.213366][ T164] Call Trace:\n[ 42.213483][ T164] \u003cTASK\u003e\n[ 42.213565][ T164] __fbnic_pm_attach.isra.0+0x8e/0xa0\n[ 42.213725][ T164] pci_reset_function+0x116/0x1d0\n[ 42.213895][ T164] reset_store+0xa0/0x100\n[ 42.214025][ T164] ? pci_dev_reset_attr_is_visible+0x50/0x50\n[ 42.214221][ T164] ? sysfs_file_kobj+0xc1/0x1e0\n[ 42.214374][ T164] ? sysfs_kf_write+0x65/0x160\n[ 42.214526][ T164] kernfs_fop_write_iter+0x2f8/0x4c0\n[ 42.214677][ T164] ? kernfs_vma_page_mkwrite+0x1f0/0x1f0\n[ 42.214836][ T164] new_sync_write+0x308/0x6f0\n[ 42.214987][ T164] ? __lock_acquire+0x34c/0x740\n[ 42.215135][ T164] ? new_sync_read+0x6f0/0x6f0\n[ 42.215288][ T164] ? lock_acquire.part.0+0xbc/0x260\n[ 42.215440][ T164] ? ksys_write+0xff/0x200\n[ 42.215590][ T164] ? perf_trace_sched_switch+0x6d0/0x6d0\n[ 42.215742][ T164] vfs_write+0x65e/0xbb0\n[ 42.215876][ T164] ksys_write+0xff/0x200\n[ 42.215994][ T164] ? __ia32_sys_read+0xc0/0xc0\n[ 42.216141][ T164] ? do_user_addr_fault+0x269/0x9f0\n[ 42.216292][ T164] ? rcu_is_watching+0x15/0xd0\n[ 42.216442][ T164] do_syscall_64+0xbb/0x360\n[ 42.216591][ T164] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[ 42.216784][ T164] RIP: 0033:0x7f0dc8ea9986\n\nA bit of digging showed that we were invoking the phylink_resume as a part\nof the fbnic_up path when we were enabling the service task while not\nholding the RTNL lock. We should be enabling this sooner as a part of the\nndo_open path and then just letting the service task come online later.\nThis will help to enforce the correct locking and brings the phylink\ninterface online at the same time as the network interface, instead of at a\nlater time.\n\nI tested this on QEMU to verify this was working by putting the system to\nsleep using \"echo mem \u003e /sys/power/state\" to put the system to sleep in the\nguest and then using the command \"system_wakeup\" in the QEMU monitor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39831",
"url": "https://www.suse.com/security/cve/CVE-2025-39831"
},
{
"category": "external",
"summary": "SUSE Bug 1249977 for CVE-2025-39831",
"url": "https://bugzilla.suse.com/1249977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39897"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: xilinx: axienet: Add error handling for RX metadata pointer retrieval\n\nAdd proper error checking for dmaengine_desc_get_metadata_ptr() which\ncan return an error pointer and lead to potential crashes or undefined\nbehaviour if the pointer retrieval fails.\n\nProperly handle the error by unmapping DMA buffer, freeing the skb and\nreturning early to prevent further processing with invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39897",
"url": "https://www.suse.com/security/cve/CVE-2025-39897"
},
{
"category": "external",
"summary": "SUSE Bug 1250746 for CVE-2025-39897",
"url": "https://bugzilla.suse.com/1250746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39897"
},
{
"cve": "CVE-2025-39917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt\n\nStanislav reported that in bpf_crypto_crypt() the destination dynptr\u0027s\nsize is not validated to be at least as large as the source dynptr\u0027s\nsize before calling into the crypto backend with \u0027len = src_len\u0027. This\ncan result in an OOB write when the destination is smaller than the\nsource.\n\nConcretely, in mentioned function, psrc and pdst are both linear\nbuffers fetched from each dynptr:\n\n psrc = __bpf_dynptr_data(src, src_len);\n [...]\n pdst = __bpf_dynptr_data_rw(dst, dst_len);\n [...]\n err = decrypt ?\n ctx-\u003etype-\u003edecrypt(ctx-\u003etfm, psrc, pdst, src_len, piv) :\n ctx-\u003etype-\u003eencrypt(ctx-\u003etfm, psrc, pdst, src_len, piv);\n\nThe crypto backend expects pdst to be large enough with a src_len length\nthat can be written. Add an additional src_len \u003e dst_len check and bail\nout if it\u0027s the case. Note that these kfuncs are accessible under root\nprivileges only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39917",
"url": "https://www.suse.com/security/cve/CVE-2025-39917"
},
{
"category": "external",
"summary": "SUSE Bug 1250723 for CVE-2025-39917",
"url": "https://bugzilla.suse.com/1250723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39917"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39961"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd/pgtbl: Fix possible race while increase page table level\n\nThe AMD IOMMU host page table implementation supports dynamic page table levels\n(up to 6 levels), starting with a 3-level configuration that expands based on\nIOVA address. The kernel maintains a root pointer and current page table level\nto enable proper page table walks in alloc_pte()/fetch_pte() operations.\n\nThe IOMMU IOVA allocator initially starts with 32-bit address and onces its\nexhuasted it switches to 64-bit address (max address is determined based\non IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU\ndriver increases page table level.\n\nBut in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads\npgtable-\u003e[root/mode] without lock. So its possible that in exteme corner case,\nwhen increase_address_space() is updating pgtable-\u003e[root/mode], fetch_pte()\nreads wrong page table level (pgtable-\u003emode). It does compare the value with\nlevel encoded in page table and returns NULL. This will result is\niommu_unmap ops to fail and upper layer may retry/log WARN_ON.\n\nCPU 0 CPU 1\n------ ------\nmap pages unmap pages\nalloc_pte() -\u003e increase_address_space() iommu_v1_unmap_pages() -\u003e fetch_pte()\n pgtable-\u003eroot = pte (new root value)\n READ pgtable-\u003e[mode/root]\n\t\t\t\t\t Reads new root, old mode\n Updates mode (pgtable-\u003emode += 1)\n\nSince Page table level updates are infrequent and already synchronized with a\nspinlock, implement seqcount to enable lock-free read operations on the read path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39961",
"url": "https://www.suse.com/security/cve/CVE-2025-39961"
},
{
"category": "external",
"summary": "SUSE Bug 1251817 for CVE-2025-39961",
"url": "https://bugzilla.suse.com/1251817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39961"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-39990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check the helper function is valid in get_helper_proto\n\nkernel test robot reported verifier bug [1] where the helper func\npointer could be NULL due to disabled config option.\n\nAs Alexei suggested we could check on that in get_helper_proto\ndirectly. Marking tail_call helper func with BPF_PTR_POISON,\nbecause it is unused by design.\n\n [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39990",
"url": "https://www.suse.com/security/cve/CVE-2025-39990"
},
{
"category": "external",
"summary": "SUSE Bug 1252054 for CVE-2025-39990",
"url": "https://bugzilla.suse.com/1252054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39990"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: Take a reference on the task in struct vhost_task.\n\nvhost_task_create() creates a task and keeps a reference to its\ntask_struct. That task may exit early via a signal and its task_struct\nwill be released.\nA pending vhost_task_wake() will then attempt to wake the task and\naccess a task_struct which is no longer there.\n\nAcquire a reference on the task_struct while creating the thread and\nrelease the reference while the struct vhost_task itself is removed.\nIf the task exits early due to a signal, then the vhost_task_wake() will\nstill access a valid task_struct. The wake is safe and will be skipped\nin this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40024",
"url": "https://www.suse.com/security/cve/CVE-2025-40024"
},
{
"category": "external",
"summary": "SUSE Bug 1252686 for CVE-2025-40024",
"url": "https://bugzilla.suse.com/1252686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40024"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().\n\nmptcp_active_enable() is called from subflow_finish_connect(),\nwhich is icsk-\u003eicsk_af_ops-\u003esk_rx_dst_set() and it\u0027s not always\nunder RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40133",
"url": "https://www.suse.com/security/cve/CVE-2025-40133"
},
{
"category": "external",
"summary": "SUSE Bug 1253328 for CVE-2025-40133",
"url": "https://bugzilla.suse.com/1253328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix NULL pointer dereference in __dm_suspend()\n\nThere is a race condition between dm device suspend and table load that\ncan lead to null pointer dereference. The issue occurs when suspend is\ninvoked before table load completes:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000054\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\nRIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50\nCall Trace:\n \u003cTASK\u003e\n blk_mq_quiesce_queue+0x2c/0x50\n dm_stop_queue+0xd/0x20\n __dm_suspend+0x130/0x330\n dm_suspend+0x11a/0x180\n dev_suspend+0x27e/0x560\n ctl_ioctl+0x4cf/0x850\n dm_ctl_ioctl+0xd/0x20\n vfs_ioctl+0x1d/0x50\n __se_sys_ioctl+0x9b/0xc0\n __x64_sys_ioctl+0x19/0x30\n x64_sys_call+0x2c4a/0x4620\n do_syscall_64+0x9e/0x1b0\n\nThe issue can be triggered as below:\n\nT1 \t\t\t\t\t\tT2\ndm_suspend\t\t\t\t\ttable_load\n__dm_suspend\t\t\t\t\tdm_setup_md_queue\n\t\t\t\t\t\tdm_mq_init_request_queue\n\t\t\t\t\t\tblk_mq_init_allocated_queue\n\t\t\t\t\t\t=\u003e q-\u003emq_ops = set-\u003eops; (1)\ndm_stop_queue / dm_wait_for_completion\n=\u003e q-\u003etag_set NULL pointer!\t(2)\n\t\t\t\t\t\t=\u003e q-\u003etag_set = set; (3)\n\nFix this by checking if a valid table (map) exists before performing\nrequest-based suspend and waiting for target I/O. When map is NULL,\nskip these table-dependent suspend steps.\n\nEven when map is NULL, no I/O can reach any target because there is\nno table loaded; I/O submitted in this state will fail early in the\nDM layer. Skipping the table-dependent suspend logic in this case\nis safe and avoids NULL pointer dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40134",
"url": "https://www.suse.com/security/cve/CVE-2025-40134"
},
{
"category": "external",
"summary": "SUSE Bug 1253386 for CVE-2025-40134",
"url": "https://bugzilla.suse.com/1253386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix SGI cleanup on unbind\n\nThe driver incorrectly determines SGI vs SPI interrupts by checking IRQ\nnumber \u003c 16, which fails with dynamic IRQ allocation. During unbind,\nthis causes improper SGI cleanup leading to kernel crash.\n\nAdd explicit irq_type field to pdata for reliable identification of SGI\ninterrupts (type-2) and only clean up SGI resources when appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40161",
"url": "https://www.suse.com/security/cve/CVE-2025-40161"
},
{
"category": "external",
"summary": "SUSE Bug 1253410 for CVE-2025-40161",
"url": "https://bugzilla.suse.com/1253410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus-\u003edai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40162",
"url": "https://www.suse.com/security/cve/CVE-2025-40162"
},
{
"category": "external",
"summary": "SUSE Bug 1253422 for CVE-2025-40162",
"url": "https://bugzilla.suse.com/1253422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40165"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nxp: imx8-isi: m2m: Fix streaming cleanup on release\n\nIf streamon/streamoff calls are imbalanced, such as when exiting an\napplication with Ctrl+C when streaming, the m2m usage_count will never\nreach zero and the ISI channel won\u0027t be freed. Besides from that, if the\ninput line width is more than 2K, it will trigger a WARN_ON():\n\n[ 59.222120] ------------[ cut here ]------------\n[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654\n[ 59.238569] Modules linked in: ap1302\n[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT\n[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)\n[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120\n[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120\n[ 59.275047] sp : ffff8000848c3b40\n[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00\n[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001\n[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780\n[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000\n[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c\n[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30\n[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420\n[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000\n[ 59.349590] Call trace:\n[ 59.352025] mxc_isi_channel_chain+0xa4/0x120 (P)\n[ 59.356722] mxc_isi_m2m_streamon+0x160/0x20c\n[ 59.361072] v4l_streamon+0x24/0x30\n[ 59.364556] __video_do_ioctl+0x40c/0x4a0\n[ 59.368560] video_usercopy+0x2bc/0x690\n[ 59.372382] video_ioctl2+0x18/0x24\n[ 59.375857] v4l2_ioctl+0x40/0x60\n[ 59.379168] __arm64_sys_ioctl+0xac/0x104\n[ 59.383172] invoke_syscall+0x48/0x104\n[ 59.386916] el0_svc_common.constprop.0+0xc0/0xe0\n[ 59.391613] do_el0_svc+0x1c/0x28\n[ 59.394915] el0_svc+0x34/0xf4\n[ 59.397966] el0t_64_sync_handler+0xa0/0xe4\n[ 59.402143] el0t_64_sync+0x198/0x19c\n[ 59.405801] ---[ end trace 0000000000000000 ]---\n\nAddress this issue by moving the streaming preparation and cleanup to\nthe vb2 .prepare_streaming() and .unprepare_streaming() operations. This\nalso simplifies the driver by allowing direct usage of the\nv4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40165",
"url": "https://www.suse.com/security/cve/CVE-2025-40165"
},
{
"category": "external",
"summary": "SUSE Bug 1253405 for CVE-2025-40165",
"url": "https://bugzilla.suse.com/1253405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40175"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: cleanup remaining SKBs in PTP flows\n\nWhen the driver requests Tx timestamp value, one of the first steps is\nto clone SKB using skb_get. It increases the reference counter for that\nSKB to prevent unexpected freeing by another component.\nHowever, there may be a case where the index is requested, SKB is\nassigned and never consumed by PTP flows - for example due to reset during\nrunning PTP apps.\n\nAdd a check in release timestamping function to verify if the SKB\nassigned to Tx timestamp latch was freed, and release remaining SKBs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40175",
"url": "https://www.suse.com/security/cve/CVE-2025-40175"
},
{
"category": "external",
"summary": "SUSE Bug 1253426 for CVE-2025-40175",
"url": "https://bugzilla.suse.com/1253426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()\n\nIf new_asoc-\u003epeer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0\nand sctp_ulpevent_make_authkey() returns 0, then the variable\nai_ev remains zero and the zero will be dereferenced\nin the sctp_ulpevent_free() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40187",
"url": "https://www.suse.com/security/cve/CVE-2025-40187"
},
{
"category": "external",
"summary": "SUSE Bug 1253647 for CVE-2025-40187",
"url": "https://bugzilla.suse.com/1253647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"ipmi: fix msg stack when IPMI is disconnected\"\n\nThis reverts commit c608966f3f9c2dca596967501d00753282b395fc.\n\nThis patch has a subtle bug that can cause the IPMI driver to go into an\ninfinite loop if the BMC misbehaves in a certain way. Apparently\ncertain BMCs do misbehave this way because several reports have come in\nrecently about this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40192",
"url": "https://www.suse.com/security/cve/CVE-2025-40192"
},
{
"category": "external",
"summary": "SUSE Bug 1253622 for CVE-2025-40192",
"url": "https://bugzilla.suse.com/1253622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: quota: create dedicated workqueue for quota_release_work\n\nThere is a kernel panic due to WARN_ONCE when panic_on_warn is set.\n\nThis issue occurs when writeback is triggered due to sync call for an\nopened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance\nis needed at sync path, flush for quota_release_work is triggered.\nBy default quota_release_work is queued to \"events_unbound\" queue which\ndoes not have WQ_MEM_RECLAIM flag. During f2fs balance \"writeback\"\nworkqueue tries to flush quota_release_work causing kernel panic due to\nMEM_RECLAIM flag mismatch errors.\n\nThis patch creates dedicated workqueue with WQ_MEM_RECLAIM flag\nfor work quota_release_work.\n\n------------[ cut here ]------------\nWARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148\nCall trace:\n check_flush_dependency+0x13c/0x148\n __flush_work+0xd0/0x398\n flush_delayed_work+0x44/0x5c\n dquot_writeback_dquots+0x54/0x318\n f2fs_do_quota_sync+0xb8/0x1a8\n f2fs_write_checkpoint+0x3cc/0x99c\n f2fs_gc+0x190/0x750\n f2fs_balance_fs+0x110/0x168\n f2fs_write_single_data_page+0x474/0x7dc\n f2fs_write_data_pages+0x7d0/0xd0c\n do_writepages+0xe0/0x2f4\n __writeback_single_inode+0x44/0x4ac\n writeback_sb_inodes+0x30c/0x538\n wb_writeback+0xf4/0x440\n wb_workfn+0x128/0x5d4\n process_scheduled_works+0x1c4/0x45c\n worker_thread+0x32c/0x3e8\n kthread+0x11c/0x1b0\n ret_from_fork+0x10/0x20\nKernel panic - not syncing: kernel: panic_on_warn set ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40196",
"url": "https://www.suse.com/security/cve/CVE-2025-40196"
},
{
"category": "external",
"summary": "SUSE Bug 1253624 for CVE-2025-40196",
"url": "https://bugzilla.suse.com/1253624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Clear minor number before put device\n\nThe device minor should not be cleared after the device is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40197",
"url": "https://www.suse.com/security/cve/CVE-2025-40197"
},
{
"category": "external",
"summary": "SUSE Bug 1253450 for CVE-2025-40197",
"url": "https://bugzilla.suse.com/1253450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40203"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlistmount: don\u0027t call path_put() under namespace semaphore\n\nMassage listmount() and make sure we don\u0027t call path_put() under the\nnamespace semaphore. If we put the last reference we\u0027re fscked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40203",
"url": "https://www.suse.com/security/cve/CVE-2025-40203"
},
{
"category": "external",
"summary": "SUSE Bug 1253457 for CVE-2025-40203",
"url": "https://bugzilla.suse.com/1253457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
FKIE_CVE-2025-40198
Vulnerability from fkie_nvd - Published: 2025-11-12 22:15 - Updated: 2025-11-14 16:42| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/01829af7656b56d83682b3491265d583d502e502 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/2a0cf438320cdb783e0378570744c0ef0d83e934 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/7bf46ff83a0ef11836e38ebd72cdc5107209342d | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/8ecb790ea8c3fc69e77bace57f14cf0d7c177bd8 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/a6e94557cd05adc82fae0400f6e17745563e5412 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/b2bac84fde28fb6a88817b8b761abda17a1d300b | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/e651294218d2684302ee5ed95ccf381646f3e5b4 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring."
}
],
"id": "CVE-2025-40198",
"lastModified": "2025-11-14T16:42:30.503",
"metrics": {},
"published": "2025-11-12T22:15:46.923",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/01829af7656b56d83682b3491265d583d502e502"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/2a0cf438320cdb783e0378570744c0ef0d83e934"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/7bf46ff83a0ef11836e38ebd72cdc5107209342d"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/8ecb790ea8c3fc69e77bace57f14cf0d7c177bd8"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/a6e94557cd05adc82fae0400f6e17745563e5412"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/b2bac84fde28fb6a88817b8b761abda17a1d300b"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/e651294218d2684302ee5ed95ccf381646f3e5b4"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
WID-SEC-W-2025-2595
Vulnerability from csaf_certbund - Published: 2025-11-12 23:00 - Updated: 2026-03-08 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2595 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2595.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2595 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2595"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40178",
"url": "https://lore.kernel.org/linux-cve-announce/2025111240-CVE-2025-40178-8673@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40179",
"url": "https://lore.kernel.org/linux-cve-announce/2025111243-CVE-2025-40179-6d22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40180",
"url": "https://lore.kernel.org/linux-cve-announce/2025111243-CVE-2025-40180-8258@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40181",
"url": "https://lore.kernel.org/linux-cve-announce/2025111243-CVE-2025-40181-f51c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40182",
"url": "https://lore.kernel.org/linux-cve-announce/2025111243-CVE-2025-40182-fa1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40183",
"url": "https://lore.kernel.org/linux-cve-announce/2025111243-CVE-2025-40183-fb2f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40184",
"url": "https://lore.kernel.org/linux-cve-announce/2025111243-CVE-2025-40184-9760@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40185",
"url": "https://lore.kernel.org/linux-cve-announce/2025111244-CVE-2025-40185-0689@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40186",
"url": "https://lore.kernel.org/linux-cve-announce/2025111244-CVE-2025-40186-b204@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40187",
"url": "https://lore.kernel.org/linux-cve-announce/2025111244-CVE-2025-40187-7826@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40188",
"url": "https://lore.kernel.org/linux-cve-announce/2025111244-CVE-2025-40188-86c5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40189",
"url": "https://lore.kernel.org/linux-cve-announce/2025111244-CVE-2025-40189-c4ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40190",
"url": "https://lore.kernel.org/linux-cve-announce/2025111244-CVE-2025-40190-b6bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40191",
"url": "https://lore.kernel.org/linux-cve-announce/2025111245-CVE-2025-40191-1ea5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40192",
"url": "https://lore.kernel.org/linux-cve-announce/2025111245-CVE-2025-40192-6344@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40193",
"url": "https://lore.kernel.org/linux-cve-announce/2025111245-CVE-2025-40193-6519@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40194",
"url": "https://lore.kernel.org/linux-cve-announce/2025111245-CVE-2025-40194-d959@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40195",
"url": "https://lore.kernel.org/linux-cve-announce/2025111245-CVE-2025-40195-f91e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40196",
"url": "https://lore.kernel.org/linux-cve-announce/2025111245-CVE-2025-40196-f1fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40197",
"url": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40197-e5de@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40198",
"url": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40198-7a99@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40199",
"url": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40199-054c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40200",
"url": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40200-c514@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40201",
"url": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40201-b8fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40202",
"url": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40202-f5ad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40203",
"url": "https://lore.kernel.org/linux-cve-announce/2025111247-CVE-2025-40203-c83b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40204",
"url": "https://lore.kernel.org/linux-cve-announce/2025111247-CVE-2025-40204-0f06@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40205",
"url": "https://lore.kernel.org/linux-cve-announce/2025111247-CVE-2025-40205-ad43@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40206",
"url": "https://lore.kernel.org/linux-cve-announce/2025111247-CVE-2025-40206-b396@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40207",
"url": "https://lore.kernel.org/linux-cve-announce/2025111247-CVE-2025-40207-3528@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40208",
"url": "https://lore.kernel.org/linux-cve-announce/2025111247-CVE-2025-40208-ded6@gregkh/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4379 vom 2025-11-25",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22392 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22392"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22405 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22405"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22405 vom 2025-12-02",
"url": "https://linux.oracle.com/errata/ELSA-2025-22405.html"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2025-12-03",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#December_02_2025"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22405 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22405"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22854 vom 2025-12-08",
"url": "https://access.redhat.com/errata/RHSA-2025:22854"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22854 vom 2025-12-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-22854.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-095 vom 2025-12-08",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-095.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28048 vom 2025-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-28048.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-December/019260.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22854 vom 2025-12-14",
"url": "https://errata.build.resf.org/RLSA-2025:22854"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4393-1 vom 2025-12-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23424 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23424"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23450 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23450"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23422 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23422"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23426 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23426"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23423 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23423"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23427 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23427"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23425 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23425"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4422-1 vom 2025-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23463 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23463"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4506-1 vom 2025-12-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTUJ36GACHYQN5EBFUNRPSW63S3SZXJ5/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4505-1 vom 2025-12-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3D5W2444LYTUJVXYGB63LTMU25GRLRJR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4515-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4516-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4517-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4521-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4530-1 vom 2025-12-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4530-1 vom 2025-12-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZJXHV4TJM3LRAHWS7AE4LY344HKKW3D/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0029-1 vom 2026-01-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0033-1 vom 2026-01-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0034-1 vom 2026-01-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SD42TBT2POVOPEQIWTZDVKRXUBRUUL3W/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0032-1 vom 2026-01-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20021-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20015-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20012-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20059-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20039-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0144-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0146-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023786.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0145-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023787.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0148-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0154-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0166-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0163-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0155-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0176-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PSMTB6JYSBEU2CF3OD7SW3ZIJGKEKBZA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0173-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C7EZZMG5MOJB6A2OZ4KLGVN4SVE4LWEL/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0168-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUZFNORTIL7FT4JAMWNYAWMBHYUP24BR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0174-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYNRLMEYZG4OCUWVVR7BLL22PT3MTAV7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0169-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023802.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0171-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0180-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0185-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023821.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0186-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0184-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0188-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023823.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0187-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0202-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023839.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0191-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0206-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0200-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023840.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0204-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023837.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0203-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023838.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0209-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023841.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0246-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0247-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023843.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0262-1 vom 2026-01-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AWNTVMXJYTURBPUXSIOYGW72SXW3YMXY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0269-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0270-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0274-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0283-1 vom 2026-01-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RL3G7CGUCYSV3BWUFT3T7JKBIRLXKROU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50071 vom 2026-01-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-50071.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20112-1 vom 2026-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VAR5E3K2CEDVGJPL4HSCKQYB2XQD7AYZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20149-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20169-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20168-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023939.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20164-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20171-1 vom 2026-02-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024010.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20202-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024017.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20120-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PEJKNNWOBXY6QH746YIQRZDAHVNYS7TJ/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20145-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIKVKDA42VXBWDNHA6WP345IDVA2E3XU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20207-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20228-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20220-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50100 vom 2026-02-10",
"url": "http://linux.oracle.com/errata/ELSA-2026-50100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-3 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8030-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8034-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0471-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-4 vom 2026-02-13",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20259-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0518-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024257.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0515-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024264.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20334-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0546-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024245.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20265-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20250-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20263-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024220.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20248-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20251-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20261-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024224.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0489-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024153.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0490-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024152.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0491-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024151.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20255-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20258-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20252-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20253-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20262-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024222.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20256-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20254-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024229.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0524-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024255.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0525-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024254.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20260-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024215.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0521-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024256.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0543-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20266-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20257-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20249-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0561-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0560-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0556-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024269.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0550-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024266.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0551-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024265.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0554-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0555-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024270.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0557-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024268.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0548-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20400-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20376-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20383-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024309.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20382-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024310.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8048-1 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8048-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20381-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024311.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20397-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20396-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20384-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024308.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20385-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8033-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20398-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024294.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8034-2 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8034-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20399-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024293.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20380-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-1 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20379-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20392-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20393-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20378-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20394-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-6 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8033-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20377-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-2 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8029-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20395-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8033-7"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-112 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-112.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-8 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8033-8"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-3 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8029-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20464-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024420.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20478-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20462-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024422.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20473-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024411.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20455-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024429.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20456-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024428.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20457-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024427.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20458-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024426.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20459-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024425.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20472-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024412.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20471-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024413.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20470-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024414.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20469-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024415.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20468-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024416.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20463-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024421.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20466-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024418.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20460-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024424.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20465-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20461-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024423.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20516-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024459.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20517-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024458.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20518-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024457.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20515-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20513-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20499-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20500-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20501-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20502-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20496-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20519-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20512-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20503-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20511-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20514-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20504-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024470.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20505-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024469.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20506-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024468.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20287-1 vom 2026-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7KIWX7XP3UMVFSHT47OOZ24TQQYNNHI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20507-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024467.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20508-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024466.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20541-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024595.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20570-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20558-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024587.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20606-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024610.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20615-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20599-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20555-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024590.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20564-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20562-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20635-1 vom 2026-03-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-08T23:00:00.000+00:00",
"generator": {
"date": "2026-03-09T08:26:54.514+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2595",
"initial_release_date": "2025-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-02T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat, Oracle Linux und Amazon aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux, Rocky Enterprise Software Foundation und Debian aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-29T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "44"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40178",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40179",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40179"
},
{
"cve": "CVE-2025-40180",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40181",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40181"
},
{
"cve": "CVE-2025-40182",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40182"
},
{
"cve": "CVE-2025-40183",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40184",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40184"
},
{
"cve": "CVE-2025-40185",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40189",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40189"
},
{
"cve": "CVE-2025-40190",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40190"
},
{
"cve": "CVE-2025-40191",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40191"
},
{
"cve": "CVE-2025-40192",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40193",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40193"
},
{
"cve": "CVE-2025-40194",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40195",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40195"
},
{
"cve": "CVE-2025-40196",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40199",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40199"
},
{
"cve": "CVE-2025-40200",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40207"
},
{
"cve": "CVE-2025-40208",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40208"
}
]
}
GHSA-W7VV-57V2-CQGF
Vulnerability from github – Published: 2025-11-13 00:30 – Updated: 2025-11-13 00:30In the Linux kernel, the following vulnerability has been resolved:
ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()
Unlike other strings in the ext4 superblock, we rely on tune2fs to make sure s_mount_opts is NUL terminated. Harden parse_apply_sb_mount_options() by treating s_mount_opts as a potential __nonstring.
{
"affected": [],
"aliases": [
"CVE-2025-40198"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-11-12T22:15:46Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"id": "GHSA-w7vv-57v2-cqgf",
"modified": "2025-11-13T00:30:18Z",
"published": "2025-11-13T00:30:18Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40198"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/01829af7656b56d83682b3491265d583d502e502"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/2a0cf438320cdb783e0378570744c0ef0d83e934"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/7bf46ff83a0ef11836e38ebd72cdc5107209342d"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/8ecb790ea8c3fc69e77bace57f14cf0d7c177bd8"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a6e94557cd05adc82fae0400f6e17745563e5412"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/b2bac84fde28fb6a88817b8b761abda17a1d300b"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/e651294218d2684302ee5ed95ccf381646f3e5b4"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.